, 1 of 700
Term Definition
A packet-filtering firewall can B
filter traffic going into or out of
the network. What does a
packet-filtering firewall use to
identify what traffic is filtered?
A SFTP
B TLS
C SSH
D ACL
Give this one a try later!
True False
Correct definition
D
2 of 700
Term Definition
Why is an enterprise risk A
management (ERM) program
implemented?
A To establish a proactive risk
response strategy
,B To promote decision makers
from any sector of the
organization
C To reduce costs associated
with security assessments
D To provide public
transparency to security
operations
Give this one a try later!
True False
3 of 700
Term Definition
A Business Continuity Plan B
should be tested:
A. Once a month.
B. At least twice a year.
C. At least once a year.
D. At least once every two
years.
Give this one a try later!
True False
Correct definition
, C
4 of 700
Term Definition
Management warns to ensure
A
that users can be held
accountable for any actions
they take while logged on with
their account. The organization's
security policy mandates the
use of strong authentication and
identification methods. What is
the difference between
authentication and
identification?
A identification occurs when the
user provides a password, and
authentication occurs when the
password is verified
B identification occurs when a
user claims an identity, and
authentication occurs when the
user proves the identity
C authentication occurs when a
user professors and identity,
and identity occurs when the
user is granted access to
resources
D identification and
Term Definition
A packet-filtering firewall can B
filter traffic going into or out of
the network. What does a
packet-filtering firewall use to
identify what traffic is filtered?
A SFTP
B TLS
C SSH
D ACL
Give this one a try later!
True False
Correct definition
D
2 of 700
Term Definition
Why is an enterprise risk A
management (ERM) program
implemented?
A To establish a proactive risk
response strategy
,B To promote decision makers
from any sector of the
organization
C To reduce costs associated
with security assessments
D To provide public
transparency to security
operations
Give this one a try later!
True False
3 of 700
Term Definition
A Business Continuity Plan B
should be tested:
A. Once a month.
B. At least twice a year.
C. At least once a year.
D. At least once every two
years.
Give this one a try later!
True False
Correct definition
, C
4 of 700
Term Definition
Management warns to ensure
A
that users can be held
accountable for any actions
they take while logged on with
their account. The organization's
security policy mandates the
use of strong authentication and
identification methods. What is
the difference between
authentication and
identification?
A identification occurs when the
user provides a password, and
authentication occurs when the
password is verified
B identification occurs when a
user claims an identity, and
authentication occurs when the
user proves the identity
C authentication occurs when a
user professors and identity,
and identity occurs when the
user is granted access to
resources
D identification and