Filters
Question type

Study Flashcards

Security ____ are the areas of trust within which users can freely communicate.


A) perimeters
B) domains
C) rectangles
D) layers

Correct Answer

verifed

verified

The Security Area Working Group acts as an advisory board for the protocols and areas developed and promoted by the Internet Society and the ____.


A) IETF
B) ISO/IEC
C) ISOC
D) IRTF

Correct Answer

verifed

verified

A ____ site provides only rudimentary services and facilities.


A) cool
B) warm
C) hot
D) cold

Correct Answer

verifed

verified

An alert ____ is a document containing contact information for the people to be notified in the event of an incident.


A) message
B) roster
C) plan
D) list

Correct Answer

verifed

verified

A(n)____________________ is a plan or course of action that conveys instructions from an organization's senior management to those who make decisions,take actions,and perform other duties.

Correct Answer

verifed

verified

A policy should state that if employees violate a company policy or any law using company technologies,the company will protect them,and the company is liable for the employee's actions.

Correct Answer

verifed

verified

A managerial guidance SysSP document is created by the IT experts in a company to guide management in the implementation and configuration of technology.

Correct Answer

verifed

verified

A buffer against outside attacks is frequently referred to as a(n) ____.


A) proxy server
B) no-man's land
C) DMZ
D) firewall

Correct Answer

verifed

verified

Redundancy can be implemented at a number of points throughout the security architecture,such as in ____.


A) firewalls
B) proxy servers
C) access controls
D) All of the above

Correct Answer

verifed

verified

Evidence is the physical object or documented information that proves an action occurred or identifies the intent of a perpetrator._________________________

Correct Answer

verifed

verified

NIST Special Publication 800-18 Rev.1,The Guide for Developing Security Plans for Federal Information Systems,includes templates for major application security plans.

Correct Answer

verifed

verified

Laws are more detailed statements of what must be done to comply with policy._________________________

Correct Answer

verifed

verified

Informational controls guide the development of education,training,and awareness programs for users,administrators,and management.

Correct Answer

verifed

verified

SP 800-18 Rev.1,The Guide for Developing Security Plans for Federal Information Systems,must be customized to fit the particular needs of a(n)organization._________________________

Correct Answer

verifed

verified

What is the purpose of security education,training,and awareness (SETA)?

Correct Answer

verifed

verified

The purpose of SETA is to enhance securi...

View Answer

The global information security community has universally agreed with the justification for the code of practices as identified in the ISO/IEC 17799.

Correct Answer

verifed

verified

Some policies may need a(n)____________________ indicating their expiration date.

Correct Answer

verifed

verified

A(n)contingency plan is prepared by the organization to anticipate,react to,and recover from events that threaten the security of information and information assets in the organization,and,subsequently,to restore the organization to normal modes of business operations._________________________

Correct Answer

verifed

verified

The policy champion and manager is called the policy ____________________.

Correct Answer

verifed

verified

The gateway router can be used as the front-line defense against attacks,as it can be configured to allow only set types of protocols to enter.

Correct Answer

verifed

verified

Showing 41 - 60 of 108

Related Exams

Show Answer