Final OS.docx - Question 1 2.86000 out of 2.86000 points are formal written policies describing employee behavior when using company computer and

Final OS.docx - Question 1 2.86000 out of 2.86000 points...

This preview shows page 1 - 4 out of 10 pages.

Question 1 2.86000 out of 2.86000 points ___________________________ are formal written policies describing employee behavior when using company computer and network systems. Selected Answer: Acceptable use policies Correct Answer: Acceptable use policies Question 2 2.86000 out of 2.86000 points _____________ risk is the possible outcome that can occur when an organization or business unsuccessfully addresses its fiscal obligations. Selected Answer: Financi al Correct Answer: Financi al Question 3 2.86000 out of 2.86000 points An efficient organization requires the proper alignment of people, processes, and technology. One of the ways good security policies can mitigate this risk is through enforcement. Which of the following situations is an example of enforcement? Selected Answer: an employee is given the authority to request a wire transfer, and a manager is required to approve the transfer Correct Answer: an employee is given the authority to request a wire transfer, and a manager is required to approve the transfer Question 4 2.86000 out of 2.86000 points In recent years, ___________________ has emerged as major technology. It provides a way of buying software, infrastructure, and platform services on someone else’s network. Selected Answer: cloud computing Correct
Image of page 1
Answer: cloud computing Question 5 2.86000 out of 2.86000 points It is important for an organization to determine how it wants to manage ____________________, which means how to group various tasks, and____________________, which relates to the number of layers and number of direct reports found in an organization. Selected Answer: division of labor, span of control Correct Answer: division of labor, span of control Question 6 0.00000 out of 2.86000 points In 2010, a major restaurant the chain suffered a network breach when malware was discovered to have collected customer credit card information that was later stolen by an outside party. Such a breach was a PCI DSS framework violation. Which of the following actions is the first step that should have been taken to ensure the PCI DSS framework was safely protecting the credit card information? Selected Answer: virus scanning Correct Answer: network segregation Question 7 2.86000 out of 2.86000 points It is important to conduct a nearly continuous evaluation of possible ______________ to guarantee that recovery estimates provided to customers are accurate and maintain credibility with customers. Selected Answer: downtim es Correct Answer: downtim es Question 8 2.86000 out of 2.86000 points Which of the following agencies is responsible for developing information
Image of page 2
security standards and procedures that adhere to federal law? Selected Answer: The National Institute of Standards and Technology (NIST) Correct Answer: The National Institute of Standards and Technology (NIST) Question 9 2.86000 out of 2.86000 points If an organization is creating a customized data classification scheme, it is important to keep in mind the accepted guidelines. Which of the following is not one these guidelines?
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 10 pages?

  • Fall '17
  • Nilsa Elias
  • security policies

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture