95%(133)127 out of 133 people found this document helpful
This preview shows page 14 - 17 out of 20 pages.
Question 342 out of 2 pointsThe window of ________________ is the time between when an opportunity for risk is identified and when the risk is ultimately eliminated by a patch.Question 352 out of 2 pointsOne of the six specifications for entities that implement SCAP is to provideparticular names for operation systems, applications, and hardware. This specification articulates a standard naming convention for systems to promote consistency across varied products. Which of the following specifications fits this description?Question 362 out of 2 pointsThere are several different best practices available for implementation when creating a plan for IT security policy compliance monitoring. One such practice is to design a baseline derived from the security policy, which entails _________________.
Question 372 out of 2 pointsIt is important that ___________________ accounts have full and unencumbered rights to restore data as well as to configure, install, repair,and recover applications and networks.Question 382 out of 2 pointsIn order to establish cogent expectations for what’s acceptable behavior for those utilizing an organization’s technology asset, an Acceptable Use Policy (AUP) defines the targeted functions of computers and networks. This policy delimits unacceptable uses and the consequences for policy violation. Which of the following topics is notlikely to be found in an AUP?Question 392 out of 2 pointsWhich of the following statements does notoffer an explanation of what motivates an insider to pose a security risk?
Question 402 out of 2 pointsWhen is the best time to implement security policies to help developers diminish the number of vulnerabilities during application development?