4-2 Reading Quiz
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
200
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by SuperFlag11392
4-2 Reading Quiz
Your work has been saved and submitted
Written Mar 25, 2024 9:43 PM - Mar 25, 2024 10:05
PMAttempt 1 of 2
Attempt Score
20 / 20 - A
Overall Grade (Highest Attempt)
20 / 20 - A
stion 1
2 / 2 po
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
Question options:
Service level agreement (SLA)
Blanket purchase agreement (BPA)
Memorandum of understanding (MOU)
Interconnection security agreement (ISA)
on Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have
the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing?
Question options:
Job rotation
Least privilege
Need-to-know
Separation of duties
on
What government agency sponsors the National Centers of Academic Excellence (CAE) for the Cyber Operations Program?
Question options:
National Security Agency (NSA)
Central Intelligence Agency (CIA)
Federal Bureau of Investigation (FBI)
National Institute of Standards and Technology (NIST)
on Which of the following programs requires passing a standardized examination that is based upon a job-task analysis?
Question options:
Certificate of completion
Professional certification
Bachelor's degree
Doctoral degree
on Security training programs typically differ from security education programs in their focus on ______________.
Question options:
security topics
hands-on skills
theoretical models
academic courses
on
Security awareness training should remind employees to ensure confidentiality by not leaving any sensitive information
or documents on their desks.
Question options:
True
False
on Classification scope determines what data you should classify;
classification process determines how you handle classified data.
Question options:
True
False
on A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing.
Question options:
True
False
on The main purpose of security training courses is to rapidly train students in one or more skills, or to cover essential knowledge in one or more specific areas.
Question options:
True
False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
on The idea that users should be granted only the levels of permissions they need in order to perform their duties is called the principle of least privilege.
Question options:
x
True
False
Done