This is the final exam that will consist of 50 multiple choice and true/false questions. Please select the most important response for each question. You will have 2 attempts with the highest grade being accepted as final. All answers 100% correct aid gra
Question 1 1. There are several types of domains in the IT infrastructure. Which of the following is not one of these domains? A. user B. workstation C. remote access D. VPN Question 2 1. Policies and standards are a collection of concrete definitions that describe acceptable and unacceptable human behavior. The questions related to are more appropriate for procedures or guidelines than policies or standards, which require detail that is more at the level of . where, when and how; what and why how; what where and when; what, who and why where, when, and how; what, who, and why Question 3 1. Though there are many ways to group security policies, a common method is to organize common risks and related policy issues into that share similarities but are distinctive enough to allow logical separation into more manageable secure areas. A. segmented networks B. system access policies C. domains D. workstations Question 4 1. Of the eight classic personality types in the workplace, commanders, can often appear angry or even hostile toward ideas and others on the team and are critical of others’ ideas. True False Question 5 1. in e-commerce broadly deals with creating rules on how to handle a consumer’s transaction and other information. A. Security controls B. Consumer rights C. Personal privacy D. Shareholder rights Question 6 1. describes how to design and implement an information security governance structure, whereas describes security aspects for employees joining, moving within, or leaving an organization. A. Human resources security, organization of information security B. Information security policy, organization of information security C. Organization of information security, human resources security D. Human resources security, asset management Question 7 1. Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the system. If a potential employee is required to undergo a drug screening, which of the following controls is being conducted? A. preventive security controls B. technical security controls C. physical security controls D. administrative controls Question 8 1. is a measurement that quantifies how much information can be transmitted over the network. Memory DMZ Cloud storage Bandwidth Question 9 1. controls the processes associated with monitoring and changing configuration throughout the life of a system. This includes the original baseline configuration. A. Web-Based Enterprise Management B. Simple Network Management C. Configuration management D. Change management
Written for
- Institution
- New Jersey Institute Of Technology
- Course
- CS 610 (CS610)
Document information
- Uploaded on
- June 28, 2021
- Number of pages
- 20
- Written in
- 2020/2021
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
question 1 1 there are several types of domains in the it infrastructure which of the following is not one of these domains
-
question 2 1 policies and standards are a collection of concrete definit