IS 411 Exam 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Tom is the IT manager for an organization that experienced a server failure that affected a single business function. What type of plan should guide the organization's recovery effort?

Business continuity plan (BCP)

Rodrigo is a security professional He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy?

Choose Your Own Device (CYOD)

For Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?

Correspondent node (CN)

T or F - Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure webpages

False

IoT devices cannot share and communicate your data to other systems and applications without your authorization

False IoT devices can share and communicate your IoT device data to other systems and applications without your authorization or knowledge.

T or F - The term "risk methodology" refers to a list of identified risks that results from the risk identification process.

False Risk methodology is a description of how an organization manages risk. Risk register is a list of identified risks.

T or F - The business continuity plan (BCP) identifies the resources for which a business impact analysis (BIA) is necessary.

False The BIA identifies the resources for which a BCP is necessary.

T or F - An uninterruptible power supply (UPS) is an example of a reactive component of a disaster recovery plan (DRP).

False An uninterruptible power supply is an example of a preventive component of a DRP.

T or F - A router is a security appliance that is used to filter Internet Protocol (IP) packets and block unwanted packets

False Firewall A firewall is a security appliance that is used to filter IP packets and block unwanted IP, Transmission Control Protocol (TCP), and User Datagram Protocol (UDP) packet types from entering or leaving the network.

For Mobile IP, which device is responsible for assigning each mobile node (MN) a local address?

Foreign agent (FA)

Isabella is in charge of the disaster recovery plan (DRP) team. Needs to ensure that data center operations will transfer smoothly to an alternate site in the event of a major interruption. She plans to run a complete test that will interrupt primary data center and transfer processing capability to a hot site. What option is described in the scenario?

Full interruption test

Which of the following would govern the use of IoT by healthcare providers, such as physicians and hospitals?

HIPAA

In Mobile IP, which device is responsible for keeping track of mobile nodes?

Home agent (HA)

Dawn is selecting an alternative processing facility for her organization's primary data center. She needs a facility with the least switchover time, even if it's the most expensive option. What is the most appropriate option in this situation?

Hot Site

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit cards. A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?

Payment Card Industry Data Security Standards - (PCI DSS)

Hajar is developing a business impact assessment for her organization. She is working with business units to determine the target state of recovered data that allows the organization to continue normal processing after a major interruption. Which of the following is Hajar determining?

Recovery Point Objective (RPO)

As a follow-up to her annual testing, Isabella would like to conduct quarterly disaster recovery tests. These tests should include role-playing and introduce as much realism as possible without affecting live operations. What type of test should Isabella conduct?

Simulation test

T or F - Each 5G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.

True Everything connect to a network has an IP address


Ensembles d'études connexes

Chapter 7 - External Competitiveness

View Set

Community Health Test 1 - Ch 1, 2, 3, 5, 9, 11, 12, 24

View Set

Money And Banking Final Study Guide

View Set

HST 130 Rogers Final Exam Study Guide

View Set

PSPO 1 - Scrum.org Question Bank

View Set