Placeholder

SEC 440 DeVry Final Exam Latest

$40.00

Quantity:

Product Description

SEC 440 DeVry Final Exam Latest

SEC 440 DeVry Final Exam Latest

SEC440

 

SEC 440 DeVry Final Exam Latest

Page 1

Question 1.1. (TCO 1) A security policy must be accepted by (Points : 5)

  • management.
  • end-users.
  • customers.
  • all members of an organization.

Question 2.2. (TCO 2) What element of a security policy does the following phrase belong to? “This policy is established to achieve compliance with applicable statutes, regulations, and mandates regarding the management of information resources.” (Points : 5)

  • The statement of authority
  • The policy statement
  • The policy objectives
  • The policy audience

Question 3.3. (TCO 3) Which is the process of accumulating data regarding a specific logical or physical environment? (Points : 5)

  • Foot printing
  • Scanning
  • Enumeration
  • All of the above

Question 4.4. (TCO 4) Which of the following information about a person can be used to influence a hiring decision? (Points : 5)

  • Educational credentials
  • Negative credit history
  • Relevant certifications
  • All of the above

Question 5.5. (TCO 5) Why is it sometimes better to isolate critical equipment than it is to apply additional protective measures, in order to protect against exposure to greater hazards or risks from unauthorized access? (Points : 5)

  • Management requests it.
  • There is less risk involved.
  • It can be less costly.
  • Regulators prefer it.

Question 6.6. (TCO 5) A security perimeter is (Points : 5)

  • the widest imaginary circle around a facility.
  • a barrier of protection.
  • the field around which security alarms can monitor activity.
  • None of the above

Question 7.7. (TCO 6) Logging, as it pertains to media removal, is only needed when (Points : 5)

  • the media are paper based.
  • it is outsourced.
  • it is handled in-house.
  • It is always needed.

Question 8.8. (TCO 7) Prohibiting access to information not required for one’s work is the (Points : 5)

  • access need concept.
  • need-to-monitor concept.
  • need-to-know concept.
  • required information process concept.

Question 9.9. (TCO 8) Output validation is (Points : 5)

  • verifying that a piece of code does not have any inherent vulnerabilities.
  • making sure that employees know what information to enter in a new system.
  • testing an application system by entering all kinds of character strings in the provided fields.
  • testing what information an application system returns when information is entered.

Question 10.10. (TCO 9) This test subjects a system or device to real-world attacks. (Points : 5)

  • Audit
  • Penetration test
  • Assessment
  • Interview

Question 11.11. (TCO 10) As it pertains to HIPAA, which is a covered entity? (Points : 5)

  • A medical patient protected by HIPAA
  • A healthcare provider who must be compliant with HIPAA
  • A healthcare provider who does NOT have to be compliant with HIPAA
  • A medical patient NOT protected by HIPAA

Question 12.12. (TCO 10) Which of the following standards includes monitoring failed log-ons? (Points : 5)

  • Access Control
  • Audit Controls
  • Device and Media Controls
  • Integrity Controls

Question 13.13. (TCO 11) Which government agency is in charge of developing technical security standards and guidelines for unclassified federal systems, according to FISMA? (Points : 5)

  • The OMB
  • NIST
  • The OCS
  • The NSA

Question 14.14. (TCO 11) Transmitting ePHI in e-mail is not recommended because (Points : 5)

  • e-mail is usually in clear text.
  • e-mail can be forwarded.
  • Both A and B
  • Neither A nor B

Question 15.15. (TCO 12) Attaching an unauthorized wireless network to the corporate network is considered (Points : 5)

  • a major breach in network security and a violation of the security policy.
  • a major breach in network security but not a violation of the security policy.
  • a violation of the security policy but not a major breach in network security.
  • neither a major breach in network security nor a violation of the security policy.

Question 16.16. (TCO 12) A strong password is at least how many characters? (Points : 5)

  • 5
  • 6
  • 7
  • 8

Question 17.17. (TCO 1) A policy that secures and protects assets from foreseeable harm and provides flexibility for the unforeseen is (Points : 5)

  • accurately reflecting the current technology environment.
  • complying with applicable government policy.
  • the best goal for a new policy.
  • approved by management and understood by everyone.

Question 18.18. (TCO 2) Which of the following should you strive for in the policy statement, in order to have a well-written policy? (Points : 5)

  • Contain areas that address every aspect of operations and information and every area affecting the organization’s information assets.
  • Spell check the document to avoid typographical errors.
  • Include applicable standards, guidelines, and procedures within the policy document.
  • Describe everything in layman’s terms so that it is clear the policy is a statement of everyone’s intent.

Question 19.19. (TCO 3) When it comes to information security, what is labeling the primary vehicle for? (Points : 5)

  • Communicating the sensitivity level
  • Communicating the access controls
  • Enforcing the access controls
  • Auditing the access controls

Question 20.20. (TCO 5) In the context of information security, environmental security would refer to all of the following except (Points : 5)

  • design and construction of facilities.
  • configuration of wireless access points.
  • where equipment is stored.
  • how and where people move.

Page 2

Question 1. 1. (TCO 3) Explain and contrast the core information security concepts of confidentiality, integrity, and availability. (Points : 40)

Question 2. 2. (TCO 8) Describe the steps a system development team could take to make sure security features are designed into newly developed systems, and explain why this is important to an organization. (Points : 40)

Question 3. 3. (TCO 10) Describe and explain the HIPAA Security Rule. (Points : 40)

Question 4. 4. (TCO 12) What should every small business do to ensure that it is secure? (Points : 40)

SEC 440 DeVry Final Exam Latest

SEC 440 DeVry Final Exam Latest

 

ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERALQUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT

There are no reviews yet.

Add your review