Question 30 0 out of 2 points It is important for an organization to determine

Question 30 0 out of 2 points it is important for an

This preview shows page 8 - 11 out of 14 pages.

Question 30 0 out of 2 pointsIt is important for an organization to determine how it wants to manage ____________________, which means how to group various tasks, and____________________, which relates to the number of layers and number of direct reports found in an organization. Question 31 0 out of 2 points
Image of page 8
Successful security policy implementation in the workplace depends on people understanding key concepts and embracing the material. Thus, people need to be motivated to succeed if they are going to implement such policies. There are three basic elements of motivation: pride, self-interest, and success. Which of the following does not occur when these elements are combined? Question 32 0 out of 2 pointsThough there are many ways to group security policies, a common method is to organize common risks and related policy issues into__________________ that share similarities but are distinctive enough to allow logicalseparation into more manageable secure areas. Question 33 2 out of 2 pointsA key component to IT security is authorization, which is especially important in large, complex organizations with thousands of employees and hundreds of systems. Two methods of authorization are role based access control (RBAC) and attribute based access control (ABAC). Although RBAC and ABAC can provide the same access, which of the following is an advantage of ABAC? Question 34 0 out of 2 pointsIn order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a _________________________, which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites.
Image of page 9
Question 35 0 out of 2 pointsUsing switches, routers, internal firewalls, and other devices, you can restrict network traffic with a ____________________, which limits what and how computers are able to talk to each other.
Image of page 10
Image of page 11

You've reached the end of your free preview.

Want to read all 14 pages?

  • Summer '16

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture