97%(153)149 out of 153 people found this document helpful
This preview shows page 11 - 14 out of 15 pages.
Question 38 2 out of 2 pointsOne of the processes designed to eradicate maximum possible security risks is to ________________, which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals. Question 39 2 out of 2 pointsThere are many ways that people can be manipulated to disclose knowledge that can be used to jeopardize security. One of these ways is to call someone under the false pretense of being from the IT department. This isknown as _________________________.
Question 40 2 out of 2 pointsWhich of the following statements does notoffer an explanation of what motivates an insider to pose a securityrisk? Question 41 2 out of 2 pointsAccording to the best practices most widely adopted to protect users and organizations, _______________ employs an approach that sets up overlapping layers of security as the preferred means of mitigating threats. Question 42 2 out of 2 pointsIt is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring can deter risk. To serve this goal, a ________________ can be used to assemble logs from platforms throughout the network.
Question 43 2 out of 2 pointsIn order to establish cogent expectations for what’s acceptable behavior for those utilizing an organization’s technology asset, an Acceptable Use Policy (AUP) defines the targeted functions of computers and networks. This policy delimits unacceptable uses and the consequences for policy violation. Which of the following topics is notlikely to be found in an AUP?