CIS 502 Week 5 Midterm Exam

$45.00

CIS 502 Week 5 Midterm Exam

CIS 502 Week 5

CIS 502 Midterm Exam Latest A+ graded Check description below !

Description

CIS 502 Week 5 Midterm Exam,

  • Question 1

2 out of 2 points

The statement, “Information systems should be configured to require strong passwords”, is an example of a/an:

 

  • Question 2

2 out of 2 points

Annualized loss expectancy is defined as:

 

  • Question 3

2 out of 2 points

A qualitative risk assessment is used to identify:  

 

 

  • Question 4

2 out of 2 points

An organization recently underwent an audit of its financial applications. The audit report stated that there were several segregation of duties issues that were related to IT support of the application. What does this mean?
  • Question 5

2 out of 2 points

The statement, “Promote professionalism among information system security practitioners through the provisioning of professional certification and training.” is an example of a/an:  

 

 

  • Question 6

2 out of 2 points

Exposure factor is defined as:

 

  • Question 7

2 out of 2 points

An employee with a previous criminal history was terminated. The former employee leaked several sensitive documents to the news media. To prevent this, the organization should have:

 

  • Question 8

2 out of 2 points

An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?

 

  • Question 9 

2 out of 2 points

 

www.Hwacer.com

A security manager is developing a data classification policy. What elements need to be in the policy?

 

  • Question 10

2 out of 2 points

An organization wishes to purchase an application, and is undergoing a formal procurement process to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics?

 

  • Question 11

2 out of 2 points

An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as:

 

  • Question 12

2 out of 2 points

CIA is known as:

 

  • Question 13

2 out of 2 points

An organization suffered a virus outbreak when malware was download by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle:

 

www.Hwacer.com

 

MORE DETIALS HIDDEN…………………….

 

Latest A+ graded Scored 100/100!