Product Description
SEC 360 DeVry Week 5 Quiz Latest
SEC 360 DeVry Week 5 Quiz Latest
SEC360
SEC 360 DeVry Week 5 Quiz Latest
Question 1. Question : (TCO 6) The layers of physical security defense in depth do not include _____.
- monitoring (video or human)
- intrusion detection/prevention
- mechanical and electronic
- environmental
- security clearances
Question 2. Question : (TCO 6) Which of the following are categories of intrusion detection devices?
- Door sensors
- Biometric detectors
- Perimeter detectors
- Security detectors
- All of the above
Question 3. Question : (TCO 6) Physical security deals with all of the following except _____.
- buildings
- logical systems
- computer rooms
- computer devices
- fences
Question 4. Question : (TCO 7) Security operations generally does not provide controls for _____.
- IN personnel security
- resource protection
- backup and recovery of locally stored workstation data
- privileged entity controls
- virus scanning
Question 5. Question : (TCO 7) Security operations does NOT use controls for _____.
- threats
- vulnerabilities
- intrusions
- communications devices
- management decision making
Question 6. Question : (TCO 8) Disaster recovery planning includes all of the following except _____.
- IT systems and applications
- application data
- data entry users
- networks
- IN communication lines
Question 7. Question : (TCO 8) A business impact analysis identifies _____.
- risks to the business
- quantifies risks
- risks to the business if critical services are discontinued
- IN priorities of restoring critical services
- All of the above
Question 8. Question : (TCO 9) The minimum set of access rights or privileges needed to perform a specific job description is called _____.
- separation of duties
- least privilege
- privileged controls
- separation of privilege
Question 9. Question : (TCO 9) Which of the following is NOT true for RADIUS?
- Uses remote access Dial-In User Service
- Used by AOL to authenticate users
- Creates a private tunnel between end points
- Policies can be centrally administered
- Can use multifactor authentication
Question 10. Question : (TCO 9) The predominant strategy that is used to assure confidentiality is _____.
- biometric authentication
- discretionary access control
- role-based access control
- symmetric encryption
- the principle of least privilege

SEC 360 DeVry Week 5 Quiz Latest
ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERALQUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT
There are no reviews yet.