100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Item File- Practice Test Bank - Web Security for Network and System Administrators,Mackey

Rating
-
Sold
-
Pages
241
Grade
A+
Uploaded on
01-07-2024
Written in
2023/2024

Are you worried about your exam preparation for your course? Are you uncertain whether or not you are ready to enter the exam? if yes, look no further. The question bank, to be used in conjunction with Web Security for Network and System Administrators,Mackey allows you to practice and get ready for exams by giving access to tremendous amount of test questions written exclusively by textbook authors. These questions go in line with the textbook and cover the entire chapters. Satisfaction guaranteed. 100% Downloadable. Instant Access. Buy now.

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
July 1, 2024
Number of pages
241
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CHAPTER 1-INTRODUCTION TO INFORMATION SECURITY




TRUE/FALSE



1. It is important that every company protect not only its data, but the people, infrastructure, and
systems that support this data.


ANS: T PTS: 1 REF: 7



2. In the context of creating a security policy, for the areas in which it is determined that the
business is willing to accept the risk, the risk must be approved by management, but once it has
been approved, in order to wisely use company resources, no reassessment is necessary in the
future.


ANS: F PTS: 1 REF: 8



3. To effectively build a new security policy, a company or organization should dump its existing
written policies and procedures and start planning from scratch.


ANS: F PTS: 1 REF: 9



4. It is not possible for you to calculate the internal value of systems that serve a dual-purpose.


ANS: F PTS: 1 REF: 10



5. In many companies, the responsibility for physical security does not lie with the IT or
Information Security departments.


ANS: T PTS: 1 REF: 14

, 6. In general, a security policy should include measures for preventing malicious activity that
attempts to access systems via their physical interface.


ANS: T PTS: 1 REF: 15



7. Many pertinent questions surround the use of passwords. Whatever the answers to these questions
are, security professionals should allow differences to exist across applications and platforms.


ANS: F PTS: 1 REF: 16



8. The security of an environment is only as strong as the weakest link.


ANS: T PTS: 1 REF: 16



9. One important aspect of an effective security policy is requiring specific security settings on the
systems within an environment.


ANS: T PTS: 1 REF: 18



10. A security policy should never specify requirements for vulnerability scanners, compliance
checking tools, or other security tools that run within the environment.


ANS: F PTS: 1 REF: 18



11. The CISSP is designed for corporate security officers, security advisors, and other individuals
who set security architecture, policies, and processes.


ANS: T PTS: 1 REF: 19



12. Currently, the CISSP, SSCP, and GIAC certifications are the only security-related certifications
from venerable certification organizations available.

, ANS: F PTS: 1 REF: 21



13. All security professionals should have a good list of Web sites and subscribe to a variety of
mailing lists.


ANS: T PTS: 1 REF: 22




14. The figure above shows the PPP triad.


ANS: F PTS: 1 REF: 5




MODIFIED TRUE/FALSE

, 1. Enforcing data availability involves the processes or technical mechanisms that ensure the data is
transferred without necessary modifications. _________________________


ANS: F, integrity


PTS: 1 REF: 5



2. The now infamous distributed denial-of-service attacks of 1999 involved dozens of separate
systems focused on making the target Web sites unavailable to legitimate users by flooding the
target with useless traffic. _________________________


ANS: T PTS: 1 REF: 6



3. A Web site that sells products brings in a quantifiable amount of money to the company. This
monetary amount determines the profitable value for the company Web site.
_________________________


ANS: F, external


PTS: 1 REF: 10



4. Because the external value is often part of the business case that was built to justify the existence
of an asset, the external value may be hard to retrieve. _________________________


ANS: F

easy

simple


PTS: 1 REF: 10



5. In most cases, information represents an asset more valuable than a company’s products and
services. _________________________

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestBank4Textbooks Harvard Law School
View profile
Follow You need to be logged in order to follow users or courses
Sold
199
Member since
1 year
Number of followers
25
Documents
2972
Last sold
4 hours ago
Practice tests and quizzes

You can find bunch of tests, quizzes, and practice exams for a lot of college-level textbooks and classes. We cover colleges in the U.S. , Canada and worldwide.

4.1

34 reviews

5
22
4
2
3
4
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions