SEC 440 DeVry Week 6 Quiz Latest



Product Description

SEC 440 DeVry Week 6 Quiz Latest

SEC 440 DeVry Week 6 Quiz Latest



SEC 440 DeVry Week 6 Quiz Latest

Question 1. Question : (TCO 6) An employee who fails to report a suspected security weakness

  • is doing his or her job.
  • will not be punished.
  • will be treated the same as if he or she had initiated a malicious act against the company.
  • is making sure not to aggravate the situation by making a mistake.

Question 2. Question : (TCO 7) Which of the following is NOT an access control method?

  • MAC
  • RBAC
  • DAC
  • PAC

Question 3. Question : (TCO 8) When is the best time to think about security when writing a new piece of code?

  • IN At the end, once all the modules have been written
  • After the users have had a chance to review the application
  • At the beginning of the project
  • After the application has been approved and authorized by the ISO

Question 4. Question : (TCO 9) As it pertains to GLBA, what does NPI stand for?

  • Nonpublic information
  • Nonpublic personal information
  • Nonprivate information
  • Nonprivate personal information

Question 5. Question : (TCO 6) The primary antimalware control is

  • an updated antivirus solution.
  • a firewall.
  • a router.
  • an acceptable use policy.

Question 6. Question : (TCO 7) Which is the first target of a hacker who has gained access to an organization’s network?

  • Log files
  • Sensitive data
  • User accounts
  • Public data

Question 7. Question : (TCO 8) Which formal security-related process should take place at the beginning of the code creation project?

  • Risk assessment
  • Input validation
  • Output validation
  • SQL injection validation

Question 8. Question : (TCO 9) Who enforces the GLBA?

  • Eight different federal agencies and states
  • The FDIC
  • The FFIEC
  • The Secretary of the Treasury

Question 9. Question : (TCO 6) The part of the antivirus solution that needs to be updated daily is

  • the DAT files.
  • central command.
  • the control panel.
  • the engine.

Question 10. Question : (TCO 7) All users are expected to keep their password secret, unless

  • IN a member of the IT group asks for it.
  • another employee needs to log on as them.
  • d. someone identifying themselves as the ISO asks for it.
  • There is no “unless.”

Question 11. Question : (TCO 8) If an employee uses a company-provided application system and finds what he or she thinks is a loophole that allows access to confidential data, that employee should

  • alert his or her manager and the ISO immediately.
  • verify and test the alleged loophole before alerting anyone.
  • not say anything unless he or she is a member of the incident response team.
  • alert his or her manager whenever he or she happens to have a chance to do so.

Question 12. Question : (TCO 9) What do the Interagency Guidelines require every covered institution to implement?

  • Quarterly risk assessments
  • A biannual review of the disaster recovery plan
  • A comprehensive written information security program
  • A monthly inventory of all information assets

Question 13. Question : (TCO 6) Grandfather-father-son is a model used for

  • antivirus updates.
  • antispyware updates.
  • backup strategies.
  • change control management strategies.

Question 14. Question : (TCO 7) Which of the following is the most popular single factor authentication method?

  • Cameras
  • IN Biometric devices
  • Tokens
  • Passwords

Question 15. Question : (TCO 8) Input validation is

  • verifying that a piece of code does not have any inherent vulnerabilities.
  • making sure that employees know what information to enter in a new system.
  • testing an application system by entering all kinds of character strings in the provided fields.
  • testing what information an application system returns when information is entered.
SEC 440 DeVry Week 6 Quiz Latest

SEC 440 DeVry Week 6 Quiz Latest



There are no reviews yet.

Add your review