Info
Warning
Danger
/ Homework Answers / Computer Science / 1. A document that defines how an organization deals with

Question

 

1. A document that defines how an organization deals with some aspect of security is a(n) __________.

a. Security policy

b. Business plan

c. Security update

d. None of the above

2. Passwords, Internet use, email attachments, software installation, instant messaging, and desktop configuration are areas of ______.

a. Computer policies

b. User policies

c. Documentation

d. Network policies

3. A good password has at least ________ characters.

a. 6

b. 8

c. 10

d. 12

4. __________ is the most obvious reason for organizations to provide their users with Internet access.

a. Email

b. Job searching

c. Emergency communications

d. None of the above

5. Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?

a. Email

b. Online training

c. Web meetings

d. Online shopping during a break time

6. Which of the following should NOT be a part of an organization’s policy regarding email attachments?

a. It was an expected attachment.

b. It came from a known source, and the source is confirmed.

c. It appears to be a legitimate business document.

d. None of the above

7. Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

a. Desktop configuration

b. Instant messaging

c. USB drives

d. None of the above

8. The background, screensaver, font size, and resolution are elements of _______.

a. Desktop configuration

b. File extensions

c. Passwords

d. None of the above

9.  Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies.

a. User

b. Computer

c. System administration

d. Password

10. New employees should receive a copy of the company’s __________ policies.

a. Business continuation

b. Disaster recovery

c. Security/acceptable use

d. None of the above

11. When an employee leaves, all _______ should be terminated.

a. Web histories

b. Logins

c. Desktops

d. Passwords

12. If you determine a virus has struck a system, the first step is to _________.

a. Scan and clean infected systems

b. Log the incident

c. Unplug the machines from the network

d. Notify appropriate organization leaders

13. If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated.

a. Computer operating system

b. Computer manufacturer

c. IP address

d. None of the above

14. The conflict between the users’ goal for unfettered access to data and the security administrator’s goal to protect that data is an issue of ______________.

a. System administration

b. Access control

c. Password protection

d. Social engineering

15.  The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.

a. Implicit deny

b. Least privilege

c. Separation of duty

d. Job rotation

 

 

Solution
5 (1 Ratings )

Solved
Computer Science 2 Months Ago 20 Views
This Question has Been Answered!
Premium Content -

Unlimited Access

Explore More than 2 Million+
  • Textbook Solutions
  • Flashcards
  • Homework Answers
  • Documents
Signup for Better Grades!

Ask an Expert

Our Experts can answer your tough homework and study questions
150466 Computer Science Questions Answered!
Post a Question

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16894 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!