DEVRY SEC360 WEEK 1 QUIZ

(TCO 1) Defense-in-depth is a _____.

security requirement

security model

security strategy

security policy

security control

Question 2. Question :

(TCO 1) What are the common effects of controls?

Prevention, detection, and response

Administration, technology, and physical

Detection, accounting, and access control

Identification, audit, and access control

Confidentiality, integrity, and availability

Question 3. Question :

(TCO 1) Information security managers should not be motivated by _____.

IN concern for the well-being of society

governmental regulation

fear, uncertainty, and doubt

promotion potential

readiness

:

Question 4. Question :

(TCO 1) The unique security issues and considerations of every system make it crucial to understand all of the following, except _____.

security standards

security skills of developers

hardware and software security configurations

data sensitivity

IN the business of the organization

Question 5. Question :

(TCO 2) Which of the following domains is not part of the IISSCC CBK?

Architecture

Project Management

Ethics

Law

Operations Security

Question 6. Question :

(TCO 2) A security event that causes damage is called _____.

IN a compromise

a violation

an incident

a mishap

a transgression

Question 7. Question :

(TCO 2) What is the enemy of security?

Industry

Foreign nations

Competitors

Complexity

People

Question 8. Question :

(TCO 2) What are the effects of security controls?

Confidentiality, integrity, and availability

Administrative, physical, and operational

Detection, prevention, and response

Management, operational, and technical

None of the above

Question 9. Question :

(TCO 1) Policies and procedures are often referred to as _____.

models

a necessary evil

guidelines

documentation

Question 10. Question :

(TCO 2) There are _____ domains of the Common Body of Knowledge.

12

nine

11

10

Order now