Question 39 1.An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations. A. incident response team (IRT)B. business impact analysis team (BIAT)C. disaster recovery plan team (DRPT)D. information technology subject matter experts (ITSME )
2 points Question 40 1._____________is the act of protecting information and the systems that store and process it. 2 points Question 41 1.In information security, the individual responsible for setting goals for implementing security policies is the _________________. 2 points Question 42 1.A security _____________identifies a group of fundamental configurations designed to accomplish particular security objectives.
2 points Question 43 1.When writing a ____________________,one could state how often a supplier will provide a service or how quickly a firm will respond. For managed services, this document often covers system availability and acceptable performance measures. A. contractB. policyC. service level agreementD. Standard 2 points Question 44 1.The initial step in creating a business continuity and security response plan is a _________________, which can be used to assemble the business and security responses in order to diminish losses. 2 points Question 45 1.To reduce malware attacks, it can be useful to implement a content filtering standard. One such policy that involves LAN-to-WAN connectivity and filtering is a DMZ control standard, which institutes the controls for publicly accessible devices to situate them in a DMZ.
2 points Question 46 1.There are many ways that people can be manipulated to disclose knowledge that can be used to jeopardize security. One of these ways is to call someone under the false pretense of being from the IT department. This is known as _________________________. 2 points Question 47 1.One of the methods that an organization can use to determine compliance is to perform _______________. boundary protectionsrandom auditsincident responsesystem scans 2 points Question 48 1.Which of the following is not one of the “five pillars of the IA model”
2 points Question 49 1.It is important that security policies establish a concrete distinction between work life and home life. Such a distinction requires that employees understand that they have no expectation of _______________. 2 points Question 50 1.According to the best practices most widely adopted to protect users and organizations, _______________employs an approach that sets up overlapping layers of security as the preferred means of mitigating threats. 2 points Save and Submit
You've reached the end of your free preview.
Want to read all 19 pages?