Saint Leo COM540 Module 4 Mid Term Exam

A midterm exam covering IT project management and communication strategies.

Amelia Davis
Contributor
4.1
50
10 months ago
Preview (4 of 13 Pages)
100%
Log in to unlock

Page 1

Saint Leo COM540 Module 4 Mid Term Exam - Page 1 preview image

Loading page ...

SAINT LEO COM540 MODULE 4 MID TERM EXAMQuestion 1. Question :The ____ is the point in time by which systems and data must be recovered after an outage asdetermined by the business unit.training objectiverecovery time objectivedependencyobjectiverecovery point objectiveQuestion 2. Question :The ____ contains the rules and configuration guidelines governing the implementation andoperation of IDSs within the organization.security policylog filehoneypotsite policyQuestion 3. Question :____ services are triggered by an event or request, such as a report of a compromised host, wide-spreading malicious code, software vulnerability, or something that was identified by anintrusion detection or logging system.ReactiveForensicSecurityProactiveQuestion 4. Question :

Page 2

Saint Leo COM540 Module 4 Mid Term Exam - Page 2 preview image

Loading page ...

Page 3

Saint Leo COM540 Module 4 Mid Term Exam - Page 3 preview image

Loading page ...

A(n) ____ is a document containing contact information for the individuals that need to benotified in the event of an actual incident.root rosteralert rosterhierarchical rostersequential rosterQuestion 5.Question :____ is the control approach that attempts to shift the risk to other assets, other processes, orother organizations.AcceptanceTransferenceMitigationAvoidanceQuestion 6. Question :A ____ deals with the preparation for and recovery from a disaster, whether natural or man-made.risk assessmentmitigation planrisk managementdisaster recovery planQuestion 7. Question :Which of the following is a proactive service?Incident handlingRisk analysisAnnouncements

Page 4

Saint Leo COM540 Module 4 Mid Term Exam - Page 4 preview image

Loading page ...

Alerts and warningsQuestion 8. Question :A favorite pastime of information security professionals is ____, which is realistic, head-to-headattack and defend information, security attacks, and incident response methods.parallel testingwar gamingsimulationstructured walk-throughQuestion 9. Question :In an organization, unexpected activities occur periodically; these are referred to as ____.warningsproblemsafter-actioneventsQuestion 10. Question :The ____ job functions focus more on costs of system creation andoperation, ease of use forsystem users, and timeliness of system creation, as well as transaction response time.organizational management and professionalsinformation technology management and professionalshuman resource management and professionalinformation security management and professionalsQuestion 11. Question :____ is the control approach that attempts to reduce the impact caused by the exploitation ofvulnerability through planning and preparation.Acceptance
Preview Mode

This document has 13 pages. Sign in to access the full document!