What is the primary goal of business process reengineering? Question options: To develop new security policies To improve business processes To implement an enterprise resource system To determine management bonuses

Question 1 2.5 / 2.5 points

The use of encryption and digital signatures helps ensure that what was transmitted is the same as what was received. Which of the following is assured?

Question options:

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Confidentiality

Availability

Integrity

Nonrepudiation

Question 2 2.5 / 2.5 points

The concept of “need to know” is most closely associated with which of the following?

Question options:

Authentication

Availability

Confidentiality

Integrity

Question 3 2.5 / 2.5 points

What is the primary goal of business process reengineering?

Question options:

To develop new security policies

To improve business processes

To implement an enterprise resource system

To determine management bonuses

Question 4 2.5 / 2.5 points

An unauthorized user accessed protected network storage and viewed personnel records. What has been lost?

Question options:

Confidentiality

Nonrepudiation

Integrity

Availability

Question 5 2.5 / 2.5 points

What does COBIT stand for?

Question options:

Control Objectives for Information and Related Technology

Common Objects for Information and Technology

Common Objectives for Information and Technology

Control Objects for Information Technology

Question 6 2.5 / 2.5 points

What does “tone at the top” refer to?

Question options:

Policies, in relation to standards, procedures, and guidelines

Confidentiality in the C-I-A triad

Regulatory bodies, in relation to security policies and controls

Company leaders

Question 7 2.5 / 2.5 points

Which of the following types of security controls stops incidents or breaches immediately?

Question options:

Preventive

Corrective

Detective

None of the above

Question 8 2.5 / 2.5 points

An encryption system is an example of which type of security control?

Question options:

Technical

Corrective

Physical

Administrative

Question 9 2.5 / 2.5 points

Security controls fall into three design types: preventive, detective, and:

Question options:

effective.

corrective.

quantitative.

qualitative.

Question 10 2.5 / 2.5 points

Which of the following is not a generally accepted principle for implementing a security awareness program?

Question options:

Competency should be measured.

Remind employees of risks.

Leaders should provide visible support.

None of the above.

Question 11 2.5 / 2.5 points

Of the following compliance laws, which focuses most heavily on personal privacy?

Question options:

FISMA

GLBA

HIPAA

SOX

Question 12 2.5 / 2.5 points

To which sector does HIPAA apply primarily?

Question options:

Financial

None of the above

Communications

Medical

Question 13 2.5 / 2.5 points

Which law was challenged by the American Library Association and the American Civil Liberties Union claiming it violated free speech rights of adults?

Question options:

CIPA

FERPA

HIPAA

GLBA

Question 14 2.5 / 2.5 points

To which sector does the Sarbanes-Oxley Act apply primarily?

Question options:

Medical

Publically traded companies

Financial

Communications

Question 15 2.5 / 2.5 points

Which compliance law concept states that only the data needed for a transaction should be collected?

Question options:

Public interest

Limited use of personal data

Full disclosure

Opt-in/opt-out

Question 16 2.5 / 2.5 points

You are on the West Coast but want to connect to your company’s intranet on the East Coast. You use a program to “tunnel” through the Internet to reach the intranet. Which technology are you using?

Question options:

Role-based access control

Elevated privileges

Virtual private networking

Software as a Service

Question 17 2.5 / 2.5 points

Which of the following is not true of segmented networks?

Question options:

By limiting certain types of traffic to a group of computers, you are eliminating a number of threats.

Switches, routers, internal firewalls, and other devices restrict segmented network traffic.

A flat network has more controls than a segmented network for limiting traffic.

Network segmentation limits what and how computers are able to talk to each other.

Question 18 2.5 / 2.5 points

In which domain is virtual private networking a security control?

Question options:

WAN Domain

Remote Access Domain

Both A and B

Neither A nor B

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"