Question 45 There are many ways that people can be manipulatedto disclose knowledge that can be used to jeopardize security. One of these ways is to call someone under the false pretense of being from the IT department. This is known as _________________________.
hackingsocial engineeringpretextingexploitation 7.1 points Question 46FREE QUESTION: MARK TRUE 0.6 points Question 47 According to the best practices most widely adopted to protect users and organizations, _______________employs an approach that sets up overlapping layers of security as the preferred means of mitigating threats. 7.1 points Question 48 Imagine a scenario in which an employee regularly shirks the organization’s established security policies in favor of convenience. What does this employee’s continued violation suggest about the culture of risk management in the organization?
7.1 points Question 49When is the best time to implement security policies to help developers diminish the number of vulnerabilities during application development? before the development occurswhile the application is being writtenafter the application is completedafter the first prototype of the application is completed and has been submitted for stakeholder review 7.1 points Question 50 When confronting guest and general public access, some best practices include but are not limited to the following: highly prohibiting access to specific 7.1 points Question 51 Aside from human user types, there are two other non-human user groups. Known as account types, ________________ are accounts implemented by thesystem for the purpose of supporting automated service, and ___________________ are accounts that remain non-human until individuals are assigned access and can use them to recover a system following a major outage.
You've reached the end of your free preview.
Want to read all 36 pages?
- Spring '18
- Computer Security