CIS4365 quiz1

docx

School

Florida International University *

*We aren’t endorsed by this school

Course

4365

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by MegaTank13330

Report
1. When should a wireless security policy be initially written? After a company decides to implement wireless and before it is installed   When the next generation of wireless technology is launched   When the vendor presents wireless solutions to the business   When the industry publishes new wireless standards 2. Information used to open or access a bank account is generally considered PII data   True   False 3. A weakness is found in a system's configuration which could expose client data to unauthorized users. Which of the following best describes the problem? A new threat was discovered   A new vulnerability was discovered   A new risk was discovered   A and B   B and C   A, B, and C 4. Where is a DMZ usually located?   Within the WAN   Within the Mail Server   Inside the Private LAN   Between the private LAN and the public WAN 5. What kind of workstation management refers to knowing what software is installed?
Inventory Management Patch Management Security Management  Discovery Management
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help