Cyber security quiz 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Marcus considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

Access to a high level of expertise

What is not a good practice for developing strong professional ethics?

Assume that information should be free

During which phase of the access control process does the system answer the question "what can the request access?"

Authorization

Janet is identifying a set of privileges that should be assigned to a new employee in our organization. Which phase of the access control process is she performing ?

Authorization

Janet is identifying the set of privileges that should be assigned to a new employee and organization. Which phase of the access control process is she performing ?

Authorization

Gary would like to choose an access control model in which the owner of the resource decides who may modify permissions on the resource. Which model fits the scenario?

Discretionary access control (DAC)

Change doesn't create risk for businesses

False

Configuration changes can be made at any time during the system life cycle and no process is required

False

Which of the following is an example of a hardware security control

MAC filtering

Mariyah's company recently experienced a major system outage due to failure of a critical component. During that time. The company did not register any sales through its online site. Which type of lost at the company experience as the road result of lost sales?

Oppeetunity cost

Which one of the following is an example of a logical access control

Password

Earl is preparing a risk register for his organizations risk manager program. Which day the element is least likely to be included in a risk register?

Risk survey results

Which formula is typically used to describe the components of information security risk?

Risk= likelihood X Vunerability

Which one of the following is an example of a two factor authentication

Smart card and personal identification number(PIN)

In alteration threat violates information integrity

True

Which one of the following is not a commonly said the best practice for password security

Use at least six Alpha numeric characters


Ensembles d'études connexes

The School Health Program: A Component of Community and Public Health

View Set

EnglishWhat are some common elements that are shared by obsessive compulsive disorder (OCD), body dysmorphic disorder, and hoarding

View Set

Chapter 39, 44, 46, 47, 9, 34, 35, 25, 45 EAQ (Exam 2)

View Set

DPSS- Looking at Movies, Ch. 3 Types of Films

View Set

Nurse Anesthesia NCE Board Review

View Set

Quiz: Life Insurance Policy Provisions, Riders, and Options

View Set

Pharm III - HIV medicine Case study

View Set

ExamCompass CompTIA Network+ Command Line Quiz

View Set