98%(137)134 out of 137 people found this document helpful
This preview shows page 1 - 4 out of 20 pages.
Question 12 out of 2 pointsOf all the reasons that people commit errors when it comes to IT security, which of the following is the main reason people make mistakes?Question 22 out of 2 pointsWhich of the following statements does notoffer an explanation of what motivates an insider to pose a security risk?Question 32 out of 2 pointsWhich of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning?
Question 42 out of 2 pointsThere are many ways that people can be manipulated to disclose knowledge that can be used to jeopardize security. One of these ways is tocall someone under the false pretense of being from the IT department. This is known as _________________________.Question 52 out of 2 pointsOne of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an organization?Question 62 out of 2 pointsIt is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring can deter risk. To serve this goal, a ________________ can be used to assemble logs from platforms throughout the network.
Question 72 out of 2 pointsConsider this scenario: A company that buys a sizeable amount of equipment for its manufacturing process needs to accurately report such expenditures, so it calls upon the services of financial auditors. While financial auditors might consider how robust the data might be, the company might also involve IT auditors to examine the technology in place to gather the data itself. What process is this company using to address its concerns?