Placeholder

SEC 360 DeVry Week 5 Quiz Latest

$14.00

Quantity:

Product Description

SEC 360 DeVry Week 5 Quiz Latest

SEC 360 DeVry Week 5 Quiz Latest

SEC360

 

SEC 360 DeVry Week 5 Quiz Latest

Question 1. Question : (TCO 6) The layers of physical security defense in depth do not include _____.

  • monitoring (video or human)
  • intrusion detection/prevention
  • mechanical and electronic
  • environmental
  • security clearances

Question 2. Question : (TCO 6) Which of the following are categories of intrusion detection devices?

  • Door sensors
  • Biometric detectors
  • Perimeter detectors
  • Security detectors
  • All of the above

Question 3. Question : (TCO 6) Physical security deals with all of the following except _____.

  • buildings
  • logical systems
  • computer rooms
  • computer devices
  • fences

Question 4. Question : (TCO 7) Security operations generally does not provide controls for _____.

  • IN personnel security
  • resource protection
  • backup and recovery of locally stored workstation data
  • privileged entity controls
  • virus scanning

Question 5. Question : (TCO 7) Security operations does NOT use controls for _____.

  • threats
  • vulnerabilities
  • intrusions
  • communications devices
  • management decision making

Question 6. Question : (TCO 8) Disaster recovery planning includes all of the following except _____.

  • IT systems and applications
  • application data
  • data entry users
  • networks
  • IN communication lines

Question 7. Question : (TCO 8) A business impact analysis identifies _____.

  • risks to the business
  • quantifies risks
  • risks to the business if critical services are discontinued
  • IN priorities of restoring critical services
  • All of the above

Question 8. Question : (TCO 9) The minimum set of access rights or privileges needed to perform a specific job description is called _____.

  • separation of duties
  • least privilege
  • privileged controls
  • separation of privilege

Question 9. Question : (TCO 9) Which of the following is NOT true for RADIUS?

  • Uses remote access Dial-In User Service
  • Used by AOL to authenticate users
  • Creates a private tunnel between end points
  • Policies can be centrally administered
  • Can use multifactor authentication

Question 10. Question : (TCO 9) The predominant strategy that is used to assure confidentiality is _____.

  • biometric authentication
  • discretionary access control
  • role-based access control
  • symmetric encryption
  • the principle of least privilege
SEC 360 DeVry Week 5 Quiz Latest

SEC 360 DeVry Week 5 Quiz Latest

 

ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERALQUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT

There are no reviews yet.

Add your review