Chapter 10 Quiz - Started on Saturday, 25 June 2011, 04:12...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Started on Saturday, 25 June 2011, 04:12 PM Completed on Saturday, 25 June 2011, 05:02 PM Time taken 50 mins Grade 91 out of a maximum of 100 ( 91 %)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Question 1 Marks: 3 A(n) ____ is an occurrence within a software system that is communicated to users or other programs outside the operating system. Choose one answer. a. thread b. entry c. event d. call Correct Marks for this submission: 3/3. Question 2 Marks: 3 ____ is part of the pre-trial phase of a lawsuit in which each party through the law of civil procedure can request documents and other evidence from other parties or can compel the production of evidence by using a subpoena. Choose one answer. a. Discovery b. Interrogation c. Interview d. Retention Correct Marks for this submission: 3/3. Question 3 Marks: 3 ____ monitoring compares activities against a predefined signature. Choose one answer. a. Signature-based b. Anomaly-based
Background image of page 2
c. Behavior-based d. Time-based Correct Marks for this submission: 3/3. Question 4 Marks: 3 Permissions inheritance becomes less complicated with GPOs. Choose one answer. a. True b. False Correct Marks for this submission: 3/3. Question 5 Marks: 3 ILM strategies are typically recorded in ____ policies. Choose one answer. a. user security b. storage and retention c. data confidentiality d. group Correct Marks for this submission: 3/3. Question 6 Marks: 3 The Windows file and folder ____ permission allows files or folders to be opened as read-only and to be copied. Choose one answer. a. Write b. Read and Execute
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
c. Modify d. Read Correct Marks for this submission: 3/3. Question 7 Marks: 3 The ____ is typically defined as the person responsible for the information, who determines the level of security needed for the data, and delegates security duties as required. Choose one answer. a. guardian b. manager c. owner d. custodian Correct Marks for this submission: 3/3. Question 8 Marks: 3 The first step in developing a storage and retention policy is ____________________. Answer:
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/10/2011 for the course SEC 100 taught by Professor Tuner during the Spring '11 term at Solano Community College.

Page1 / 12

Chapter 10 Quiz - Started on Saturday, 25 June 2011, 04:12...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online