CIS 4365 Quiz 3

docx

School

Florida International University *

*We aren’t endorsed by this school

Course

4365

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by MegaTank13330

Report
1. Authorization is the process used to prove the identity of the person accessing systems, applications, and data. True False 2. Another way to describe "Costs" in Security protection is? Vulnerabilities Invesment Risk Threats 3. Visitor control is an aspect of which of the following? Network security Personnel security Workstation security Physical security 4. What is Risk Acceptance? Business accepts is not cost-effective to manage the risk The threat is allowed to happen and hope to fix later Only logging will be used to deal with risks None of the above 5. What is the ultimate goal of conducting a Risk Assessment? Identifying the risk Identifying the likelihood Determining the impact Deciding what to fix
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help