4-2 Reading Quiz

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by SuperFlag11392

Report
4-2 Reading Quiz Your work has been saved and submitted Written Mar 25, 2024 9:43 PM - Mar 25, 2024 10:05 PMAttempt 1 of 2 Attempt Score 20 / 20 - A Overall Grade (Highest Attempt) 20 / 20 - A stion 1 2 / 2 po Which agreement type is typically less formal than other agreements and expresses areas of common interest? Question options: Service level agreement (SLA) Blanket purchase agreement (BPA) Memorandum of understanding (MOU) Interconnection security agreement (ISA) on Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing? Question options: Job rotation Least privilege Need-to-know Separation of duties on
What government agency sponsors the National Centers of Academic Excellence (CAE) for the Cyber Operations Program? Question options: National Security Agency (NSA) Central Intelligence Agency (CIA) Federal Bureau of Investigation (FBI) National Institute of Standards and Technology (NIST) on Which of the following programs requires passing a standardized examination that is based upon a job-task analysis? Question options: Certificate of completion Professional certification Bachelor's degree Doctoral degree on Security training programs typically differ from security education programs in their focus on ______________. Question options: security topics hands-on skills theoretical models academic courses on
Security awareness training should remind employees to ensure confidentiality by not leaving any sensitive information or documents on their desks. Question options: True False on Classification scope determines what data you should classify; classification process determines how you handle classified data. Question options: True False on A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing. Question options: True False on The main purpose of security training courses is to rapidly train students in one or more skills, or to cover essential knowledge in one or more specific areas. Question options: True False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
on The idea that users should be granted only the levels of permissions they need in order to perform their duties is called the principle of least privilege. Question options: x True False Done