Saint COm510 final exam fall 2014

Question # 00035723 Posted By: mac123 Updated on: 12/11/2014 12:41 AM Due on: 12/31/2014
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image
Question 1.1.Which of the following is a subprocess of the unfreezing process in Lewin's change model? (Points : 5)





Question 2.2.A _____ is an example of the "something you are" authentication mechanism. (Points : 5)





Question 3.3.A security technician usually reports to a person with a ____ level of authority. (Points : 5)





Question 4.4.The ____ certification program is an option for individuals who wish to take the CISSP or SSCP exams before obtaining the requisite experience for certification. (Points : 5)





Question 5.5._____ allow only specific packets with a particular source, destination, and port address to pass through it. (Points : 5)





Question 6.6.The analysis team presents its proposed mitigation plans to the _____ group. (Points : 5)





Question 7.7._____ is the third generation of firewalls. (Points : 5)





Question 8.8.The _____ team is involved in the operational area management knowledge process. (Points : 5)





Question 9.9.____ work on special projects for organizations, and are self-employed people with their own contractual obligations and security requirements. (Points : 5)





Question 10.10._____ is the most critical success factor for security risk evaluations. (Points : 5)





Question 11.11.The ____ is a division of the NSA, and provides a wide variety of information security solutions for cyber defense. (Points : 5)





Question 12.12.In a cost-benefit analysis, the _____ is the value to the organization of using controls to prevent losses associated with a specific vulnerability? (Points : 5)





Question 13.13.Deliberate software attacks include worms, denial of service, macros, and ____. (Points : 5)





Question 14.14.The Public Company Accounting Reform and Investor Protection Act demands that the CEO and ____ assume direct and personal accountability for the completeness and accuracy of a publicly traded organization's financial reporting and record-keeping systems. (Points : 5)





Question 15.15._____ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP/IP family of protocol standards. (Points : 5)





Question 16.16.An information security project wrap-up is usually a procedural task that would be assigned to a ____ staff member or an information security manager. (Points : 5)





Question 17.17.Which of the following is not an example of a disaster recovery plan? (Points : 5)





Question 18.18.In keeping with the requirements of the Public Company Accounting Reform and Investor Protection Act, the executives in an organization rely on the expertise of the ____ to ensure that the systems used to report and record information are sound. (Points : 5)





Question 19.19._____ technical controls defend against threats from outside of the organization. (Points : 5)





Question 20.20.A(n) _____ is a valuable tool in managing an intrusion detection system. (Points : 5)





Question 21.21.In the US military classification scheme, ____ refers to information assets that would adversely affect US national interests if lost, misused, or made available to sources with unauthorized access. (Points : 5)





Question 22.22.Which of the following is NOT part of the Implementing Controls phase of the Microsoft Security Risk Management program? (Points : 5)





Question 23.23.Enacted in 1999, the Gramm-Leach-Bliley Act addresses ____ issues. (Points : 5)





Question 24.24.Which of the following is a software asset type? (Points : 5)





Question 25.25.When it is developed, the CIFI body of knowledge is expected to cover ____. (Points : 5)





Question 26.26.Which law governs the federal agency use of personal information? (Points : 5)





Question 27.27.____ should not be allowed to wander freely in and out of buildings. (Points : 5)





Question 28.28.Which of the following is a domain of the CompTIA Security+ exam? (Points : 5)





Question 29.29.Which access controls are structured and coordinated with a data classification scheme? (Points : 5)





Question 30.30.The ____ was enacted to prevent abuse of information while employed elsewhere. (Points : 5)





Question 31.31.In phase 3 of the OCTAVE Method, the creation of mitigation plans occurs during the _____ process. (Points : 5)





Question 32.32.The identification of a system of interest occurs during the _____. (Points : 5)





Question 33.33.Which of the following characteristics currently used today for authentication purposes is not considered truly unique? (Points : 5)





Question 34.34.Which of the following best describes the incident response plan? (Points : 5)





Question 35.35._____ firewalls are simple network devices that examine all incoming and outgoing packet headers, selectively allowing or rejecting packets. (Points : 5)





Question 36.36.Which of the following is a responsibility of an information security department manager? (Points : 5)





Question 37.37.Which official determines which package best serves the needs of the organization? (Points : 5)





Question 38.38._____ are software programs or hardware/software appliances that allow administrators to restrict content that comes into a network. (Points : 5)





Question 39.39.From Schwartz et al., information security positions can be categorized as those that define, those that build, and those that ____. (Points : 5)





Question 40.40._____ is a biometric authentication system that is considered to be least secure. (Points : 5)



Dot Image
Tutorials for this Question
  1. Tutorial # 00035051 Posted By: mac123 Posted on: 12/11/2014 02:07 AM
    Puchased By: 6
    Tutorial Preview
    The solution of Saint COm510 final exam fall 2014-100% correct...
    Attachments
    Saint_Com510_final_exam.docx (191.14 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    Ph...pt1 Rating Instant response from the tutors 07/24/2016
    nat...seca Rating Secure-payment gateways 05/26/2015
    da...tie Rating Elaborated tutorials; all points covered 04/28/2015

Great! We have found the solution of this question!

Whatsapp Lisa