96%(225)215 out of 225 people found this document helpful
This preview shows page 1 - 4 out of 19 pages.
Test Information Description This is the final exam that will consist of 50 multiple choice and true/false questions. Please select the most important response for each question. You will have 2 attempts with the highest grade being accepted as final. Instructions Multiple Attempts This test allows 2 attempts. This is attempt number 2. Force Completion This test can be saved and resumed later. Question Completion Status: Question 1 1.There are several types of domains in the IT infrastructure. Which of the following is notone of these domains?A. userB. workstationC. remote accessD. VPN2 points Question 2 1.Policies and standards are a collection of concrete definitions that describe acceptable and unacceptable human behavior. The questions related to_______________ are more appropriate for procedures or guidelines than policies or standards, which require detail that is more at the level of________________.where, when and how; what and whyhow; whatwhere and when; what, who and whywhere, when, and how; what, who, and why2 points
Question 3 1.Though there are many ways to group security policies, a common method is to organize common risks and related policy issues into__________________ that share similarities but are distinctive enough to allow logical separation into more manageable secure areas.2 points Question 4 1.Of the eight classic personality types in the workplace, commanders, can often appear angry or even hostile toward ideas and others on the team and are critical of others’ ideas.2 points Question 5 1._____________________ in e-commerce broadly deals with creating rules on how to handle a consumer’s transaction and other information.
2 points Question 6 1._________________describes how to design and implement an information security governance structure, whereas __________________ describes security aspects for employees joining, moving within, or leaving an organization.A. Human resources security, organization of information securityB. Information security policy, organization of information securityC. Organization of information security, human resources securityD. Human resources security, asset management2 points Question 7 1.Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the system. If a potential employee is required to undergo a drug screening, which of the following controls is being conducted?2 points