1. (TCO 2) Give an example of a hoax and how it might actually be destructive. (Points : 10)
2. (TCO 2) List the four ways backups are conducted and stored. (Points : 10)
3. (TCO 2) Name at least four high-level policies an organization needs to consider. (Points : 10)
4. (TCO 2) Describe the various components of a business continuity plan. (Points : 10)
5. (TCO 2) Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be. Create a bulleted list of those responsibilities. (Points : 10)
6. (TCO 3) List and describe three types of network topologies. (Points : 10)
7. (TCO 3) What is the difference between TCP and UDP? (Points : 10)
8. (TCO 4) What are the laws that govern computer access and trespass? (Points : 10)
9. (TCO 5) Describe the laws that govern digital signatures. (Points : 10)
10. (TCO 6) What are the four common methods for connecting equipment at the physical layer? (Points : 10)
11. (TCO 6) What is multiple-factor authentication? (Points : 10)
12. (TCO 6) Why is the following statement true?"Physical access negates all other security measures." (Points : 10)
13. (TCO 6) What are some of the security issues associated with web applications and plug-ins? (Points : 10)
14. (TCO 7) What are some security issues related to web-based applications? (Points : 10)
15. (TCO 9) What are the different methods of access management (MAC, DAC, RBAC)? (Points : 10)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here