Chapter 5 Review Questions

Chapter 5 Review Questions - Chapter 5 Review Questions...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 5 Review Questions Review of attempt 1 Started on Wednesday, June 15, 2011, 07:33 PM Completed on Saturday, June 18, 2011, 02:34 AM Time taken 2 days 7 hours Grade 90 out of a maximum of 100 ( 90 %) Question 1 Marks: 2 A(n) ____________________ site is a fully configured computer facility, with all services, communications links, and physical plant operations including heating and air conditioning. Answer: Correct Marks for this submission: 2/2. Question 2 Marks: 2 A standard is a plan or course of action that conveys instructions from an organization’s senior management to those who make decisions, take actions, and perform other duties. Answer: True False Correct Marks for this submission: 2/2. Question 3 Marks: 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A policy should state that if employees violate a company policy or any law using company technologies, the company will protect them, and the company is liable for the employee’s actions. Answer: True False Incorrect Marks for this submission: 0/2. Question 4 Marks: 2 The first phase in the development of the contingency planning process is the ____. Choose one answer. a. BIA b. BRP c. DP9 d. IRP Incorrect Marks for this submission: 0/2. Question 5 Marks: 2 A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization. Choose one answer. a. plan b. framework c. mission d. blanket Correct Marks for this submission: 2/2.
Background image of page 2
Question 6 Marks: 2 Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of information is referred to as ____________________. Answer: Correct Marks for this submission: 2/2. Question 7 Marks: 2 Security ____ are the areas of trust within which users can freely communicate. Choose one answer. a. perimeters b. domains c. rectangles d. layers Correct Marks for this submission: 2/2. Question 8 Marks: 2 A(n) ____________________ is a device that selectively discriminates against information flowing into or out of the organization. Answer: Correct Marks for this submission: 2/2. Question 9 Marks: 2 An attack ____________________ is a detailed description of the activities that occur during an attack. Answer:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Correct Marks for this submission: 2/2. Question 10 Marks: 2 A(n) capability table specifies which subjects and objects users or groups can access. Answer: True False Correct Marks for this submission: 2/2. Question 11 Marks: 2 A service bureau is an agency that provides a service for a fee.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/01/2011 for the course CNS 1 taught by Professor Idk during the Spring '11 term at Texas State Technical Colleges.

Page1 / 16

Chapter 5 Review Questions - Chapter 5 Review Questions...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online