Placeholder

SEC 360 DeVry Week 3 Quiz Latest

$14.00

Quantity:

Product Description

SEC 360 DeVry Week 3 Quiz Latest

SEC 360 DeVry Week 3 Quiz Latest

SEC360

 

SEC 360 DeVry Week 3 Quiz Latest

Question 1. Question: (TCO 3) _____ conduct periodic risk-based reviews of information assets, policies, and procedures.

  • Security testers
  • Vendor managers
  • Internal auditors
  • Access coordinators
  • Technical managers

Question 2. Question : (TCO 3) An excellent document to review for best practices in security management is _____.

  • IN ISO/IEC 17799
  • BS 7799
  • ISO/IEC 27001
  • Appendix H of NIST SP 800-53
  • Any of the above

Question 3. Question : (TCO 3) An organization’s security posture is defined and documented in _____ that must exist before any computers are used.

  • standards
  • guidelines
  • procedures
  • policies
  • All of the above

Question 4. Question : (TCO 3) What does SDLC stands for?

  • Software development license cycle
  • Software development life cycle
  • System development life cycle
  • System definition life cycle
  • None of the above

Question 5. Question : (TCO 4) Various countries have different views of individual privacy. The European Union (EU) has very different privacy laws than the United States has. To allow U.S. companies better ease of operation in the European Union, the Department of Commerce negotiated the _____ with the EU.

  • privacy treaty
  • Memorandum of Agreement regarding privacy
  • Privacy Reciprocity Act of 1993
  • international safe harbor principles
  • Privacy Act of 1983

Question 6. Question : (TCO 4) Which of the following “commandments” should be part of the information security professional’s code of ethics?

  • I will abide by the Constitution of the United States.
  • I will dress appropriately for the company environment.
  • I will protect the equities of senior management.
  • I will act honorably, honestly, justly, responsibly, and legally.

Question 7. Question : (TCO 5) Information hiding or data hiding is implemented through _____.

  • abstraction
  • encapsulation
  • layering
  • isolated storage
  • encryption

Question 8. Question : (TCO 5) A reference monitor is _____.

  • a security model
  • a security control
  • a network security model
  • only appropriate in ringed architecture

Question 9. Question : (TCO 4) Denial of service attacks, rogue code, and software piracy are some of the ways that _____ commit crimes.

  • aggressive programmers
  • computer enthusiasts
  • cyber criminals
  • foreign operatives

Question 10. Question : (TCO 5) The _____ can be illustrated using something known as a ring of trust.

  • TCB
  • principle of least privilege
  • secondary storage zone
  • kernel

 

SEC 360 DeVry Week 3 Quiz Latest

SEC 360 DeVry Week 3 Quiz Latest

 

ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERALQUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT

There are no reviews yet.

Add your review