This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Chapter 14 Quiz Question 1 Marks: 9 Match each item with a statement below: the care that a reasonable person would exercise under the circumstances any investigation into suspicious employee conduct will examine all material facts a set of management statements that defines an organizations philosophy of how to safeguard its information any person or thing with the power to carry out a threat against an asset a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service the systematic and structured approach to managing the potential for loss that is related to a threat defines requirements for using cryptography an organizational policy that governs the conditions to be contained in an SLA the principle of treating all accused persons in an equal fashion, using established rules and principles Question 2 Marks: 3 ____ takes a snapshot of the security of the organization as it now stands. Choose one answer. a. Risk mitigation b. Vulnerability appraisal c. Risk assessment d. Threat identification Question 3 Marks: 3 A(n) ____ policy establishes requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organizations network. Choose one answer. a. extranet b. server security c. VPN security d. demilitarized zone security Question 4 Marks: 3 A ____ is a collection of requirements specific to the system or procedure that must be met by everyone. Choose one answer. a. recommendation b. guideline c. standard d. policy Question 5 Marks: 1 A ____ is a document that outlines specific requirements or rules that must be met....
View Full Document
- Spring '11