Saint Leo COM590 Final Exam 100% Accurate

Question # 00603906
Subject: Computer Science
Due on: 03/30/2019
Posted On: 08/18/2019 04:13 PM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

Question 1 (4 points)

Saved

What is pretexting associated with?

Question 1 options:

Hiring personnel

Communication between senior management and general employees

Policy dissemination

Social engineering

Question 2 (4 points)

Saved

Pam receives an offensive joke via e-mail from Larry, a co-worker. Which of the following helps Pam know the correct actions to take?

Question 2 options:

SAP

AUP

None of the above

PAA

Question 3 (4 points)

Saved

Which type of agreement would you have a contract system administrator (temporary worker) sign?

Question 3 options:

PAA

Both A and C

AUP

SAP

Question 4 (4 points)

Saved

A standard for Web Services from an external provider would be part of which set of policies?

Question 4 options:

WAN Domain policies

System/Application Domain policies

User Domain policies

LAN Domain policies

Question 5 (4 points)

Saved

Which of the following would include information on firewalls that handle application traffic?

Question 5 options:

WAN Domain policies

System/Application Domain policies

LAN Domain policies

User Domain policies

Question 6 (4 points)

Saved

A LAN Domain policy would include guidelines for which of the following?

Question 6 options:

Telecommunications

User access rights

IDS and IPS architecture and management

Applications

Question 7 (4 points)

Saved

Which U.S. military data classification refers to data that the unauthorized disclosure of which would reasonably be expected to cause serious damage to national security?

Question 7 options:

Secret

Top Secret

Confidential

Unclassified

Question 8 (4 points)

Saved

Which policy outlines the process by which a BCP and DRP plan is activated?

Question 8 options:

Server Policy

Disaster Declaration Policy

RTP

Incident Policy

Question 9 (4 points)

Saved

In a business classification scheme, which classification refers to routine communications within the organization?

Question 9 options:

Highly sensitive

Public

Internal

Sensitive

Question 10 (4 points)

Saved

Triage is performed during which phase of incident response?

Question 10 options:

Discovery

Clean-up

Containing and Minimizing

Reporting

Previous PageNext Page

Question 11 (4 points)

Saved

Evidence from an incident must be documented and protected from the time it’s obtained to the time it’s presented in court. Which tool is used to document this evidence?

Question 11 options:

Writ of evidence

Chain of custody

Incident log

Real evidence docket

Question 12 (4 points)

Saved

According to the Payment Card Industry Data Security Standard (PCI DSS), what is classified as an incident?

Question 12 options:

An incomplete transaction

Loss of a password

Denial of Service attack

Wi-Fi password loss

Question 13 (4 points)

Saved

Before an incident can be declared, the IRT must develop an incident __________ for incident response.

Question 13 options:

procedure

budget

discovery process

control

Question 14 (4 points)

Saved

What is a benefit of instructor-led classroom training for security awareness?

Question 14 options:

Low cost

Flexibility

Both A and B

Neither A nor B

Question 15 (4 points)

Saved

What is a common consequence of failing to adhere to an acceptable use policy (AUP)?

Question 15 options:

Loss of computer privileges at work

E-mail reminder

Nothing; an AUP is only a guideline

Disciplinary action

Question 16 (4 points)

Saved

Implementing IT security policies is as much about __________ as it is about implementing controls.

Question 16 options:

changing attitudes

changing personnel

disciplinary actions

budgeting

Question 17 (4 points)

Saved

Which of the following is a common cause of security breaches?

Question 17 options:

Outsourced processing to vendors

Improved training and security awareness

Increased employee motivation

Inadequate management and user decisions

Question 18 (4 points)

Saved

What is the name of a common control that is used across a significant population of systems, applications, and operations?

Question 18 options:

Pervasive

Enterprise

Perpetual

Persistent

Question 19 (4 points)

Saved

__________ is/are key(s) to security policy enforcement.

Question 19 options:

IT personnel support

Executive support

Physical controls

A communications plan

Question 20 (4 points)

Saved

Your company does not want its employees to use the Internet to exchange personal e-mail during work hours. What is the best tool to use to ensure the company does not violate an employee’s right to privacy?

Question 20 options:

Encryption

A risk assessment

An acceptable use policy

A data leakage protection system

Question 21 (4 points)

Saved

Which of the following is least likely to indicate the effectiveness of an organization’s security policies?

Question 21 options:

Vulnerability assessments

Detective controls

Policy compliance reviews

An incident response plan

Question 22 (4 points)

Saved

Which organization created the Security Content Automation Protocol (SCAP) as part of its responsibilities under FISMA?

Question 22 options:

Microsoft

The MITRE Corporation

US-CERT

NIST

Question 23 (4 points)

Saved

A(n) __________ can include a computer’s full operating system, applications, and system settings, including security and configuration settings.

Question 23 options:

baseline

image

group policy

patch

Question 24 (4 points)

Saved

What does a configuration management database (CMDB) hold?

Question 24 options:

System configuration information

Policy change documentation

Security policies

None of the above

Question 25 (4 points)

Saved

What is a vulnerability window?

Question 25 options:

The time between when a new vulnerability is discovered and when software developers start writing a patch.

The time required to image a computer.

System downtime associated with a successful attack.

The period of time during which an attacker may launch a DoS attack.

Dot Image
mac123 Posted By :
Questions: 427 Tutorials: 854
Tutorials for this Question

Saint Leo COM590 Final Exam 100% Accurate

Tutorial # 00602583
Posted On: 08/18/2019 04:13 PM
Feedback Score: Not rated yet!
Purchased By: 2
mac123
Posted By:
Questions:
427
Tutorials:
854
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Saint Leo COM590 Final Exam 100% Accurate...
Attachments
Saint_Leo_COM590_Final_exam_100%_accurate.docx (124.62 KB)

Great! We have found the solution of this question!

Related Questions
science discussion nomel
Video provides a powerful way to help you prove your point. When you click Online Video, you can paste in the embed code for the video you want to add. You can also type a keyword to search online for …
Week 1: Information Workflow and Systems Life Cycle
Describe a process where information might be handled better in your current setting, or a setting familiar to you. What would you change, if you could, to improve information workflow, and what proce …
Week 1: Workflow Analysis
The Workflow Analysis assignment is due by Sunday 11:59 p.m. (MT) at the end of Week 1. The guidelines and grading rubric are listed and located below. NR543_W1_Workflow_Analysis_Guidelines_and_Rub …
gcu MIS 600 Full Course
  MIS 600 Full Course Discussions GCU MIS 600 Topic 1 DQ 1 Why is data important to business? What are some industries that use big data for decision making? MIS 600 Topic 1 DQ 2 D …
How Data Integration Supports Data Analytics
For this assignment, you will study the way in which data integration is used to support data analytics within a federal agency, the U.S. Department of Transportation. Use the information in the assig …
Module 01 Course Project - Troubleshooting Process
Module 01 Course Project - Troubleshooting Process In your new role at Concept Solutions, you have been examining several internal issues that require troubleshooting. Below are three incidents tha …
Saint Leo COM590 Final Exam 100% Accurate
Question 1 (4 points) Saved What is pretexting associated with? Question 1 options: Hiring personnel Communication between senior management and general employees Policy disseminatio …
UMUC Excel Project 1 – MS Excel (Fall 2018)
Excel Project 1 – MS Excel (Fall 2018) Use the following project description to complete this activity (all the details are included in this document, in the 22 steps below). For a review of …
Now, as a team, and in accordance with your team agreement, you will create
Now, as a team, and in accordance with your team agreement, you will create an eight- to 10-page Business Continuity Plan (BCP) that addresses the mission needs and systems for recovery of the whole e …
Recent Questions
Walden HLTH6475 Complete Course Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Discussion INDIVIDUAL RESPONSIBILITY VERSUS VICTIM BLAMING IN HEALTH PROMOTION Part of what makes a discussion a discussion and not a lectur …
Walden HLTH6475 All Quizzes Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Quiz Question 1 Which factors have been found to influence behavior? Socioeconomic Status Skills Culture Attitude Gender A …
Walden HLTH6475 Module 6 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Quiz Question 1 Which method allows study participants to tell their stories?  Observations In-depth individual interview &nbs …
Walden HLTH6475 Module 5 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Quiz Question 1 What alternative term has been suggested recently for hard-to-reach? Marginalized Inaccessible Hard to access Ha …
Walden HLTH6475 Module 4 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 4 Quiz Question 1 Outreach workers from the CeaseFire program spent a total of 500 combined hours with program participants during the first y …
Walden HLTH6475 Module 3 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 3 Quiz Question 1 Which of the following is the construct of the Theory of Reasoned Action that explains behavior based on what we think other …
Walden HLTH6475 Module 2 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Quiz Question 1 If the program is aimed at a true population, the term is called ______________. Intended population Intended audience …
Walden HLTH6475 All Assignments Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Assignment LANNING MODELS ARTICLE REVIEW The published literature is rich with examples of health promotion programs that have utilized the …
Walden HLTH6475 Module 6 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Assignment EVALUATION PLAN Once the program has been designed, it is time to consider how the program will be evaluated. To design an evalu …
Walden HLTH6475 Module 5 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Assignment  DEVELOPING EVALUATION QUESTIONS Evaluation takes place at various points within a program's life cycle. It requires di …