Details of this Paper

10 question multiple choice sec 360




1. (TCO 6) The media control that includes locked doors, desks, file cabinets, or safes is _____. (Points: 5) environmental protection;physical access protection;integrity verification;disposition;identification;Question 2. 2. (TCO 6) Which of the following is NOT a perimeter security control? (Points: 5) Badge;Smart card;Lock;Lighting;Dog;Question 3. 3. (TCO 6) Physical security deals with all of the following except _____. (Points: 5) buildings;logical systems;computer rooms;computer devices;fences;Question 4. 4. (TCO 7) Record retention processes _____. (Points: 5) keep track of changes made by administrators;define how long records are retained;are needed for retirement of information assets;protect company resources;protect management from prosecution;Question 5. 5. (TCO 7) As a security operations rule, policy should be established stating that media should _____. (Points: 5) be sanitized and destroyed;be marked and controlled;be marked and handled properly;never be reused;be accounted for;Question 6. 6. (TCO 8) A disaster recovery plan should always attempt to restore the system to _____. (Points: 5) full operating capability;degraded operating capability;the known good state;a stable state;an alternate operating capability;Question 7. 7. (TCO 8) A business impact analysis identifies _____. (Points: 5) risks to the business;quantifies risks;risks to the business if critical services are discontinued;priorities of restoring critical services;All of the above;Question 8. 8. (TCO 9) What is the U.S. government classification label that means that unauthorized disclosure may seriously damage national security? (Points: 5) CONFIDENTIAL;SECRET;TOP SECRET;NOFORN;RESTRICTED;Question 9. 9. (TCO 9) Access controls control access of _____ to _____. (Points: 5) people, applications;subjects, objects;roles, applications;roles, objects;Any of the above;Question 10. 10. (TCO 9) The predominant strategy that is used to assure confidentiality is _____. (Points: 5) biometric authentication;discretionary access control;role-based access control;symmetric encryption;the principle of least privilege


Paper#70339 | Written in 18-Jul-2015

Price : $22