preview

Devry Sec 360 Final Exam

Good Essays

Devry SEC 360 Final Exam
IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/Devry-SEC-360-Final-Exam-04040444251.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM
Question
Page 1 Question 1.1. (TCO 1) Security policy contains three kinds of rules as policy clauses. What are they? (Points : 5)
Preventive, detective, and responsive
Prohibitive, permissive, and mandatory
Administrative, technical, and physical
Management, technical, and operational
Roles, responsibilities, and exemptions Question 2.2. (TCO 2) The _____ of the 17 NIST control _____ can be placed into the 10 IISSCC _____ comprising the common body of knowledge for information …show more content…

(TCO 6) Many believe that the most important physical security control is _____. (Points : 5) closed-circuit television a good security plan an educated workforce certified security staff resources Question 8.8. (TCO 7) The mission of the security operations center might best be described as _____. (Points : 5) continuous monitoring maintaining the known good state policy enforcement reporting to management configuration management Question 9.9. (TCO 8) Alternate sites used in disaster recovery would normally not include which of the following? (Points : 5)
Hot site
Cold site
Warm site
Shared site
Alternate site Question 10.10. (TCO 9) The basic elements of any access control model is a reference monitor that mediates access to _____ by _____. (Points : 5) files, people objects, subjects files, principals named resources, named users computer time, applications Question 11.11. (TCO 10) In a network system, you will normally find that _____ are encrypted using asymmetric cryptography, and _____ are encrypted using symmetric cryptography. (Points : 5) signatures, messages messages, data hash totals, messages messages, hash totals data, messages Question 12.12. (TCO 10) A company wants to assure customers that their online transactions are secure. Given this

Get Access