CIS 560 WEEK 5 MIDTERM
CIS 560 Week 5 Midterm
1. In a data
classification scheme, least privilege and need to know ensure that access to
data and information is available to __________.
2. The method of
organizing sensitive information into various access levels is known as
__________.
3. In access control, which
of the following best describes access?
4. Which of the following
is a strategy that tricks a user into giving up their password or granting
access to an attacker?
5. Which of the following
is measured in terms of probability and impact?
6. From an organizational
standpoint, which of the following is ensured through compliance?
7. Which of the following
scans every packet that passes through and either rejects it or allows it to
pass?
8. In a corporation,
which of the following is considered a special case of proprietary information?
9. Which of the following
ensures that only one person does not handle all crucial decisions and
activities, especially those involving a high level of trust?
10. Which of the following
is not a typical social engineering strategy?
11. Proof of identity is
the additional step involved in _________.
12. Which of the following
statements does not hold true for RBAC?
13. Which of the following
defines how employees may use an IT infrastructure supplied by an organization?
14. Which of the following
factors is not used for network and infrastructure authentication?
15. The best way to handle
the human element in access control is through training and _________.
16. Which of the following
is not a type of security breach?
17. The Privacy Act of
1974 applies to information maintained by which of the following?
18. An attacker is using a
password-guessing application that can try 100,000 passwords per second. About
how long will it take for the application to crack an eight-character password
composed of only lowercase characters?
19. Which of the following
is a purely damaging attack, meant to render a system unusable?
20. Which of the following
is a system-created access control list that handles the information assurance
aspect of access controls?
21. The following are the
most common vulnerability categories an administrator needs to manage except:
22. What do federal and
state laws concerning unauthorized access serve as?
23. Which of the following
are primary threat categories to information and data?
24. Which of the following
is a way of simplifying the management of access controls?
25. A strategy that
combines attempts to minimize the probability and consequences of a risk
situation is termed as _________.
No comments:
Post a Comment