96%(45)43 out of 45 people found this document helpful
This preview shows page 1 - 4 out of 24 pages.
Question 1 One of the methods that an organization can use to determine compliance is to perform _______________. boundary protections random audits incident response system scans Question 2 In your Lab Report file, you wrote an IT security definition for one of the gaps you had not previously identified a policy for by:Question 3 In the scenario in the lab, you started working at a new bank and were creating an IT security policy framework for the organization that:Question 4 In which section of the security policy definition you created in the lab did you explain how the policy definition fills the identified gap in the overall IT security policy framework definition and how it mitigates the risks, threats, and vulnerabilities identified?
Question 5 Many organizations have a(n) ________________________, which is comprised of end user devices (including tablets, laptops, and smartphones) on a shared network and that use distributed system software; this enables these devices to function simultaneously, regardless of location. executive management sponsorship distributed infrastructure agentless central management tool agent Question 6 Overlapping policies:Question 7 In a business impact analysis (BIA), the phase of defining the business’s components and the component priorities, has several objectives. Which of the following is notone the objectives?
Question 8 Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?