Chapter 8 Quiz - Attempt Review-2 PDF
Chapter 8 Quiz - Attempt Review-2 PDF
Chapter 8 Quiz - Attempt Review-2 PDF
vulnerability scanner
Question 2 An auditor is asked to assess the LAN of a company for potential threats. What are three potential threats
Correct the auditor may point out? (Choose three.)
complex passwords
locked systems
Question 3 As a security professional, there is a possibility to have access to sensitive data and assets. What is one
Correct item a security professional should understand in order to make informed ethical decisions?
partnerships
potential bonus
Question 4 A school administrator is concerned with the disclosure of student information due to a breach. Under which
Correct act is student information protected?
FERPA
COPPA
Question 5 An organization has implemented a private cloud infrastructure. The security administrator is asked to
Incorrect secure the infrastructure from potential threats. What three tactics can be implemented to protect the private
cloud? (Choose three.)
Mark 0.00 out of
1.00
Select one or more:
Flag
Disable firewalls.
question
Disable ping, probing, and port scanning.
Hire a consultant.
Question 6 What are three disclosure exemptions that pertain to the FOIA? (Choose three.)
Incorrect
Select one or more:
Mark 0.00 out of
1.00
information specifically non-exempt by statue
Flag
confidential business information
question non-geological information regarding wells
Question 7 Why is Kali Linux a popular choice in testing the network security of an organization?
Correct
Select one:
Mark 1.00 out of
1.00
It is a network scanning tool that prioritizes security risks.
Flag It is an open source Linux security distribution and contains over 300 tools.
question It can be used to test weaknesses by using only malicious software.
Question 8 A company is attempting to lower the cost in deploying commercial software and is considering a cloud
Correct based service. Which cloud based service would be best to host the software?
SaaS
IaaS
Question 9 Unauthorized visitors have entered a company office and are walking around the building. What two
Correct measures can be implemented to prevent unauthorized visitor access to the building? (Choose two.)
Question 10 What are two items that can be found on the Internet Storm Center website? (Choose two.)
Correct
Select one or more:
Mark 1.00 out of
1.00
InfoSec job postings
current laws
Question 11 If a person knowingly accesses a government computer without permission, what federal act laws would the
Correct person be subject to?
ECPA
SOX
Question 12 What can be used to rate threats by an impact score to emphasize important vulnerabilities?
Correct
Select one:
Mark 1.00 out of
1.00
ACSC
Flag
CERT
question NVD
ISC
Question 13 A consultant is hired to make recommendations on managing device threats in a company. What are three
Incorrect general recommendations that can be made? (Choose three.)
Question 14 As part of HR policy in a company, an individual may opt-out of having information shared with any third
Incorrect party other than the employer. Which law protects the privacy of personal shared information?
GLBA
PCI
Question 15 A breach occurs in a company that processes credit card information. Which industry specific law governs
Correct credit card data protection?
ECPA
SOX
Question 17 A company has had several incidents involving users downloading unauthorized software, using
Incorrect unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to
manage the user threats. What three things might be put in place to manage the threats? (Choose three.)
Mark 0.00 out of
1.00
Select one or more:
Flag
Monitor all activity by the users.
question
Provide security awareness training.
Question 18 What are the three broad categories for information security positions? (Choose three.)
Incorrect
Select one or more:
Mark 0.00 out of
1.00
creators
Flag builders
question doers
definers
monitors
seekers
Finish review
NetAcad, a Cisco Corporate Social Responsibility program, is an IT skills and career building program available to learning institutions and individuals worldwide.
Terms and Conditions Cookie Policy Privacy Statement Data Protection Accessibility Trademarks