Anda di halaman 1dari 3

Maximum number of choices allowed is {0}.

Points Awarded 47.00


Points Missed 44.00
Percentage 51.6%

1. Which of the following college curriculum is more appropiated for a career


in network/info security?
A) business administration
B) computer information systems
Feedback: Page 1
C) both of the above
D) none of the above
Feedback: Page 1Points Earned: 0.0/7.0
Correct Answer(s): C

2. Which group is responsible for ensuring that systems are auditable and pro
tected from excessive privileges?
A) compliance officers
B) access coordinators
Feedback: Pages 9 and 10
C) security administrators
D) policy makers
Feedback: Pages 9 and 10Points Earned: 0.0/7.0
Correct Answer(s): C

3. Sound network/Info Security policy:


A) is a balance between the cost of protecting information and resourses and the
value of those items being protected.
B) is worth any price.
C) belongs exclusively to the IT department.
D) results in unique practices and polices specific to the owning IT department.
Feedback: Page 8
Feedback: Page 8Points Earned: 0.0/7.0
Correct Answer(s): A

4. Careers in Information and Network Security are booming because of which f


actors
A) threats of cyber terrorism
B) government regulations
C) growth of the Internet
D) All of the above
Feedback: Page 3Points Earned: 0.0/7.0
Correct Answer(s): D
5. A career in network/info security:
A) has better job growth outlook than other areas of IT.
Feedback: Page 4
B) is limited by programing languages the candidate knows.
C) will eventually disappear with improvements in network/info security tools.
D) is a highly complex but narrow disapline.
Feedback: Page 4Points Earned: 7.0/7.0
Correct Answer(s): A

6. A good definition of network/info security should include:


A) security policies and procedures.
Feedback: Page 9
B) intentional attacks only.
C) unintentional attacks only.
D) none of the other listed answers.
Feedback: Page 9Points Earned: 7.0/7.0
Correct Answer(s): A

7. Which of the following would be part of a program in network/info security


? Select all correct answers.
A) laws and ethical practices.
Feedback: Page 8
B) file and access controls
Feedback: Page 8
C) probability and statistics.
Feedback: Page 8
D) None of the other answers are fit topics for such a program.
Feedback: Page 8Points Earned: 6.0/6.0
Correct Answer(s): A , B , C

8. The growing demand for network/information security specialists is occurri


ng predominately in what types of organizations?
A) government
B) corporations
C) not-for-profit organizations
D) all of the above answers
Feedback: Page 3
E) none of the above answers
Feedback: Page 3Points Earned: 7.0/7.0
Correct Answer(s): D

9. Which of the following groups help security development teams with risk an
alysis?
A) security testers
Feedback: Pages 9 and 10
B) compliance officers
C) security consultants
D) security architects
Feedback: Pages 9 and 10Points Earned: 0.0/7.0
Correct Answer(s): C

10. Information security is discipline that manages which of the following? (


Select all correct answers.
A) technology
Feedback: All of Chapter 1
B) people
Feedback: All of Chapter 1
C) processes
Feedback: All of Chapter 1
D) oraganizations
Points Earned: 6.0/8.0
Correct Answer(s): A , B , C , D

11. Which of the following would make an individual seeking a career in netwo
rk/info security more marketable?
A) CISSP certification
Feedback: Pages 5 & 6
B) GIAC certification
C) evaluating virus and network protection products in a home lab
D) all of the above answers
Feedback: Pages 5 & 6Points Earned: 0.0/7.0
Correct Answer(s): D

12. The three objectives of network/information security are:


A) confidentiality, integrity, and availability
Feedback: Page 2
B) confidentiality, secrecy, and privacy
C) resilience, privacy, and safety
D) safety, access control, and secrecy
Feedback: Page 2Points Earned: 7.0/7.0
Correct Answer(s): A

13. What is meant by the umbrella of InfoSec?


A) When it rains it pours.
B) Network/Info Security incorporates many different pursuits and disciplines.
Feedback: Page 9
C) Just as it is bad luck to open an umbrella indoors, it's equally bad luck to
not have a Network/Info Security policy.
D) Network/Info Security policies, like umbrellas, should never be loaned to oth
ers as they are easily lost or misused.
Feedback: Page 9Points Earned: 7.0/7.0
Correct Answer(s): B

Anda mungkin juga menyukai