Site MapHelpFeedbackPost-Test
Post-Test
(See related pages)

1
What identifies the rules required to maintain information security?
A)Information security plan
B)Information security policies
C)Authentication
D)Biometrics
2
Which of the following is not one of the top 10 questions managers should ask regarding information security?
A)Is there clear accountability for information security in our organization?
B)How much is spent on information security and what is it being spent on?
C)What is the impact on the organization of a serious security incident?
D)How do we identify potential insiders?
3
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
A)Biometrics
B)Encryption
C)Firewalls
D)None of the above
4
What is the most common type of defense within detection and response technologies?
A)Malicious code
B)Token
C)User ID
D)Antivirus software
5
Which of the following is not included in the four quadrants of ethical and legal behavior?
A)Legal behavior and ethical behavior
B)Illegal behavior and ethical behavior
C)Legal behavior and unethical behavior
D)None of the above
6
What was the primary problem Saab encountered with one of its marketing companies?
A)Contacted customers based on opt-out decision
B)Contacted customers based on opt-in decision
C)Contacted customers regardless of their opt-out or opt-in decision
D)Failed to contact any customers
7
What is the policy that contains general principles to guide computer user behavior?
A)Information privacy policy
B)Acceptable use policy
C)Internet use policy
D)None of the above
8
Which of the following is part of the acceptable use policy stipulations?
A)Not using the service as part of violating any law
B)Not attempting to break the security of any computer network or user
C)Not posting commercial messages to groups without prior permission
D)All of the above
9
Which of the following represents the estimated percentage that spam accounts for in an organizations' e-mail traffic?
A)20 to 30 percent
B)30 to 50 percent
C)40 to 60 percent
D)None of the above
10
What is a program, when installed on a computer, records every keystroke and mouse click?
A)Key logger software
B)Spyware
C)Cookie
D)Adware







LS4 (UMUC) IS In Org Std OLCOnline Learning Center

Home > Chapter 4 > Post-Test