Devry Sec 360 Final Exam

Submitted by: Submitted by

Views: 10

Words: 961

Pages: 4

Category: Other Topics

Date Submitted: 12/21/2015 12:33 AM

Report This Essay

Devry SEC 360 Final Exam

IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load

http://www.hwspeed.com/Devry-SEC-360-Final-Exam-04040444251.htm?categoryId=-1

IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM

Question

Page 1

Question 1.1. (TCO 1) Security policy contains three kinds of rules as policy clauses. What are they? (Points : 5)

Preventive, detective, and responsive

Prohibitive, permissive, and mandatory

Administrative, technical, and physical

Management, technical, and operational

Roles, responsibilities, and exemptions

Question 2.2. (TCO 2) The _____ of the 17 NIST control _____ can be placed into the 10 IISSCC _____ comprising the common body of knowledge for information security. (Points : 5)

technologies, domains, families

controls, families, domains

domains, families, technologies

principles, domains, families

controls, domains, principles

Question 3.3. (TCO 2) What are the effects of security controls? (Points : 5)

Confidentiality, integrity, and availability

Administrative, physical, and operational

Detection, prevention, and response

Management, operational, and technical

Question 4.4. (TCO 3) Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that roles maintain _____, and to manage _____ because that is the enemy of security. (Points : 5)

assets, accountability, software

assets, separation of duties, complexity

software, separation of duties, complexity

software, accountability, people

people, separation of duties, technology

Question 5.5. (TCO 4) "There shall be a way for an individual to correct information in his or her records" is a clause that might be found in a _____. (Points : 5)

law

code of ethics

corporate policy

fair information practices statement

Any of the above

Question 6.6. (TCO 5) Evaluation of ideas for security may use _____, which are _____ that are not meant to be _____....