Description
Devry SEC 440 Week 6 Quiz Latest
(TCO 6) An employee who fails to report a suspected security weakness
is doing his or her job.
will not be punished.
will be treated the same as if he or she had initiated a malicious act against the company.
is making sure not to aggravate the situation by making a mistake.
: 8, page 230
4 of 4
Question 2. Question :
(TCO 7) Which of the following is NOT an access control method?
MAC
RBAC
DAC
PAC
: 9, page 273
4 of 4
Question 3. Question :
(TCO 8) When is the best time to think about security when writing a new piece of code?
IN At the end, once all the modules have been written
After the users have had a chance to review the application
At the beginning of the project
After the application has been approved and authorized by the ISO
: 10, page 313
0 of 4
Question 4. Question :
(TCO 9) As it pertains to GLBA, what does NPI stand for?
Nonpublic information
Nonpublic personal information
Nonprivate information
Nonprivate personal information
: 12, page 390
4 of 4
Question 5. Question :
(TCO 6) The primary antimalware control is
an updated antivirus solution.
a firewall.
a router.
an acceptable use policy.
: 8, page 232
4 of 4
Question 6. Question :
(TCO 7) Which is the first target of a hacker who has gained access to an organization’s network?
Log files
Sensitive data
User accounts
Public data
: 9, page 276
4 of 4
Question 7. Question :
(TCO 8) Which formal security-related process should take place at the beginning of the code creation project?
Risk assessment
Input validation
Output validation
SQL injection validation
: 10, page 313
4 of 4
Question 8. Question :
(TCO 9) Who enforces the GLBA?
Eight different federal agencies and states
The FDIC
The FFIEC
The Secretary of the Treasury
: 12, page 392
4 of 4
Question 9. Question :
(TCO 6) The part of the antivirus solution that needs to be updated daily is
the DAT files.
central command.
the control panel.
the engine.
: 8, page 232
4 of 4
Question 10. Question :
(TCO 7) All users are expected to keep their password secret, unless
IN a member of the IT group asks for it.
another employee needs to log on as them.
- d.someone identifying themselves as the ISO asks for it.
There is no “unless.”
: 9, page 281
0 of 4
Question 11. Question :
(TCO 8) If an employee uses a company-provided application system and finds what he or she thinks is a loophole that allows access to confidential data, that employee should
alert his or her manager and the ISO immediately.
verify and test the alleged loophole before alerting anyone.
not say anything unless he or she is a member of the incident response team.
alert his or her manager whenever he or she happens to have a chance to do so.
: 10, page 317
4 of 4
Question 12. Question :
(TCO 9) What do the Interagency Guidelines require every covered institution to implement?
Quarterly risk assessments
A biannual review of the disaster recovery plan
A comprehensive written information security program
A monthly inventory of all information assets
: 12, page 394
4 of 4
Question 13. Question :
(TCO 6) Grandfather-father-son is a model used for
antivirus updates.
antispyware updates.
backup strategies.
change control management strategies.
: 8, page 236
4 of 4
Question 14. Question :
(TCO 7) Which of the following is the most popular single factor authentication method?
Cameras
IN Biometric devices
Tokens
Passwords
: 9, page 281
0 of 4
Question 15. Question :
(TCO 8) Input validation is
verifying that a piece of code does not have any inherent vulnerabilities.
making sure that employees know what information to enter in a new system.
testing an application system by entering all kinds of character strings in the provided fields.
testing what information an application system returns when information is entered.
: 10, page 318
DeVry Courses helps in providing the best essay writing service. If you need 100% original papers for Devry SEC 440 Week 6 Quiz Latest, then contact us through call or live chat.
Devry SEC 440 Week 6 Quiz Latest

Reviews
There are no reviews yet.