Preview

Week 2 Quiz

Satisfactory Essays
Open Document
Open Document
599 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 2 Quiz
Question 1 of 20
Which of the following statements best describes risk? A.An error or weakness in the security system B.A negative effect or influence on an information system C.The probability of loss of a valued resource D.An external situation or event with the potential to cause harm to an IT system

Question 2 of 20
In which of the IT domains is a hub considered a major component of risk? A.LAN-WAN Domain B.User Domain C.Workstation Domain D.LAN Domain

Question 3 of 20
How does risk management impact an organization? A.Affects the survivability B.Increases the profitability C.Does not affect the profitability D.Does not affect the survivability

Question 4 of 20
Which of the following is not a technique for dealing with vulnerabilities? A.Accreditation B.Cost-benefit analysis C.System logs D.Audits

Question 5 of 20
Which of the following statements about threats is not accurate? A.Threats are always present. B.Threats can be eliminated completely. C.Appropriate actions can reduce the chances of occurrence of threats. D.Appropriate actions can reduce the impact of a threat but not the threat itself.

Question 6 of 20
What would you most commonly do to reduce the potential risk from a threat/vulnerability pair? A.Reduce the vulnerability B.Reduce the threat C.Remove controls D.Remove countermeasures

Question 7 of 20
After implementing several security controls, what should be done to ensure the controls are performing as expected? A.Continuous monitoring B.Remove existing controls C.Configuration management D.Version control

Question 8 of 20
What is the most common target of perpetrators initiating an exploit? A.End-user systems B.Users unaware of social engineering tactics C.Public-facing servers D.Internal servers

Question 9 of 20
Which of the following is a U.S. organization that publishes the Special Publication 800 (SP 800) series

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 quiz

    • 604 Words
    • 3 Pages

    7. When the researcher measures a behavior that needs to be changed, applies therapy and measures the behavior again, and then removes the treatment and measures the behavior again, this is referred to as ABA design.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 6 Quiz

    • 1032 Words
    • 5 Pages

    According to Adler, the person’s effort to overcome imagined or real personal weaknesses is called compensation.…

    • 1032 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 quiz

    • 870 Words
    • 8 Pages

    ________ is finding the most cost-effective media to deliver the desired number and type of exposures to the target audience.…

    • 870 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Week 6 Quiz

    • 781 Words
    • 8 Pages

    (TCOs 6 & 7) A change that can be implemented to enable a qualified person with a disability to perform key job functions without unduly burdening the employer is called…

    • 781 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    WEEK 2 QUIZ

    • 798 Words
    • 8 Pages

    A child learns that whenever he eats all of his dinner he gets a cookie for dessert. This type of learning is BEST explained by _______________.…

    • 798 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Hey Is This Enough

    • 274 Words
    • 2 Pages

    The concept of situational crime prevention suggests that desperate people may contemplate crime, but only the truly ____ will attack a well-defended, inaccessible target and risk strict…

    • 274 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week Three Quiz

    • 658 Words
    • 3 Pages

    1. Why should you never designate minor children as your primary beneficiary, but instead put assets intended for them into a trust?…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 2 Quiz

    • 362 Words
    • 2 Pages

    6. Which of the following is the process that assists helpers with understanding their own attitudes and feelings?…

    • 362 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    Which of the following is a U.S. organization that publishes the Special Publication 800 (SP 800) series of documents?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the scenario of a healthcare organization, answer the following assessment questions from a risk management perspective:…

    • 404 Words
    • 3 Pages
    Satisfactory Essays