Bharadwaj-Quiz 1-Info Governance
Bharadwaj-Quiz 1-Info Governance
Bharadwaj-Quiz 1-Info Governance
1. Although it is impossible to eliminate all business risks, a good policy can reduce the likelihood
of risk occurring or reduce its impact. A business must find a way to balance a number of
competing drivers. Which of the following is notone of these drivers?
A. cost
B. customer satisfaction
C. compliance
D. regulation
10 points
QUESTION 2
1. _______________ is a measurement that quantifies how much information can be transmitted
over the network.
Memory
A.
B. DMZ
C. Cloud storage
D. Bandwidth
10 points
QUESTION 3
1. _____________________ in e-commerce broadly deals with creating rules on how to handle a
consumer’s transaction and other information.
A. Security controls
B. Consumer Rights
C. Personal Privacy
D. Shareholder Rights
10 points
QUESTION 4
1. _______________ refers to an attempt to cause fear or major disruptions in a society through
hacking computers. Such attacks target government computers, major companies, or key areas
of the economy.
A. cyberterrorism
B. globalization
D. sovereign war
10 points
QUESTION 5
1. The privacy policy emerged as a type of code of conduct. With the rise of social media, many
businesses are concerned about employees posting information about the company on social
media sites. What would be forbidden personal privacy data?
B. Social Security
C. Health information
10 points
QUESTION 6
1. In 1999, the ___________________ is a law that came into being to repeal existing laws so that
banks, investment companies, and other financial services companies could merge.
10 points
QUESTION 7
1. What are the primary differences between a remote access domain and a user domain is that in
a user domain?
A. moving from a public unsecure network into the private secure company network.
B. special remote authenication
10 points
QUESTION 8
1. Although it is impossible to eliminate all business risks, a good policy can reduce the likelihood
of risk occurring or reduce its impact. A business must find a way to balance a number of
competing drivers. Which of the following is notone of these drivers?
cost
regulation
customer satisfaction
compliance
10 points
QUESTION 9
1. A typical data leakage protection program provides several layers of defense to prevent
confidential data from leaving the organization. Which of the following is not one of the layers
of defense?
inventory
A.
B. perimeter
C. device management
self-regulation
D.
10 points
QUESTION 10
1. __________is a set of processes that are used to ensure significant changes are implemented to
help individuals overcome resistance to change, help them see value or reason for the change,
and accept the change.
Self-Interest
A.
B. Organization
Change Management
C.
D. Counseling
10 points
QUESTION 11
1. A(n) ___________________ is a confirmed event that compromises the confidentiality,
integrity, or availability of information.
A. breach
B. residual risk
C. operational deviation
D. threat
10 points
QUESTION 12
1. Select the appropriate answer.
A. Align,Plan and Organize
10 points
QUESTION 13
1. The phrase “tone at the top” refers to the ways that a company’s leaders express their
____________________to security policies and make sure every employee knows the
____________________.
A. commitment, profitability
B. commitment, priorities
D. apprehension, concerns
10 points
QUESTION 14
1. While ____________ are chiefly concerned with maximizing profit and maintaining a healthy
stock price as a business concern, the government focuses more on fairness, health, and safety
issues.
auditors
shareholders
local politicians
project managers
10 points
QUESTION 15
1. Identify traits of a leader that can impact policy adoption:
A. Values
B. Goals/Vision
C. Training
D. Culture
10 points
QUESTION 16
1. Select the appropriate answer below.
A. Information Systems and Audit Control Association (ISACA)
10 points
QUESTION 17
1. In general, it is good practice to make your security policies relevant to____________ because
they stand a better chance of being followed.
A. customer satisfaction
B. business needs
C. hr practices
D. stardards
10 points
QUESTION 18
1. An organization’s _________________ is a good source for determining what should be in
security policies to meet regulatory requirements.
B. Risk, Vulnerability
C. Threat, risk
D. Risk, Threat
10 points
QUESTION 20
1. The process of restricting users’ access so that they access an application rather than the
data itself is often referred to as ____________.
A. Entitlement
B. restrictions
C. regulatory
D. standard
10 points
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
User Bharadwaj Talari
Course Fall 2019 - Operations Security (ISOL-631-30) (ISOL-631-31) - Combined - Full Term
Test Quiz 1: Chapers 1,2,3 & 4 Content Understanding
Started 9/17/19 5:09 AMLATE
Submitted 9/17/19 5:44 AMLATE
Due Date 9/16/19 11:59 PM
Status Needs Grading
Attempt Score 0 out of 200 points
Time Elapsed 34 minutes out of 1 hour
Instructions Choose the appropriate answers by selecting multiple choice, true or false or fill in the blank for
each question.
Results Feedback
Displayed
Question 1
10 out of 10 points
Although it is impossible to eliminate all business risks, a good policy can reduce the
likelihood of risk occurring or reduce its impact. A business must find a way to balance a
number of competing drivers. Which of the following is not one of these drivers?
Question 2
10 out of 10 points
_______________ is a measurement that quantifies how much information can be
transmitted over the network.
Question 3
10 out of 10 points
_____________________ in e-commerce broadly deals with creating rules on how to handle
a consumer’s transaction and other information.
Question 4
10 out of 10 points
_______________ refers to an attempt to cause fear or major disruptions in a society
through hacking computers. Such attacks target government computers, major companies,
or key areas of the economy.
Question 5
10 out of 10 points
The privacy policy emerged as a type of code of conduct. With the rise of social media, many
businesses are concerned about employees posting information about the company on
social media sites. What would be forbidden personal privacy data?
Question 6
10 out of 10 points
In 1999, the ___________________ is a law that came into being to repeal existing laws so
that banks, investment companies, and other financial services companies could merge.
Question 7
0 out of 10 points
What are the primary differences between a remote access domain and a user domain is
that in a user domain?
Question 8
10 out of 10 points
Although it is impossible to eliminate all business risks, a good policy can reduce the
likelihood of risk occurring or reduce its impact. A business must find a way to balance a
number of competing drivers. Which of the following is not one of these drivers?
Question 9
10 out of 10 points
A typical data leakage protection program provides several layers of defense to prevent
confidential data from leaving the organization. Which of the following is not one of the
layers of defense?
Question 10
10 out of 10 points
__________is a set of processes that are used to ensure significant changes are implemented
to help individuals overcome resistance to change, help them see value or reason for the
change, and accept the change.
Question 11
10 out of 10 points
A(n) ___________________ is a confirmed event that compromises the confidentiality,
integrity, or availability of information.
Question 12
0 out of 10 points
Select the appropriate answer.
Question 13
10 out of 10 points
The phrase “tone at the top” refers to the ways that a company’s leaders express their
____________________to security policies and make sure every employee knows the
____________________.
Question 14
10 out of 10 points
While ____________ are chiefly concerned with maximizing profit and maintaining a healthy
stock price as a business concern, the government focuses more on fairness, health, and
safety issues.
Question 15
10 out of 10 points
Identify traits of a leader that can impact policy adoption:
Question 16
0 out of 10 points
Select the appropriate answer below.
Question 17
0 out of 10 points
In general, it is good practice to make your security policies relevant to____________
because they stand a better chance of being followed.
Question 18
10 out of 10 points
An organization’s _________________ is a good source for determining what should be in
security policies to meet regulatory requirements.
Question 19
0 out of 10 points
Select the correct response.
Question 20
10 out of 10 points
The process of restricting users’ access so that they access an application rather than the
data itself is often referred to as ____________.