SEC 402 Strayer - Includes Midterm and Final Exams - Strayer Latest

10
SEC 402 Strayer Test Bank All Chapters included with answers. Purchase here: http://xondow.com/SEC-402-Strayer-Test-Bank- SEC402TB.htm Need Help with Final Exams? Midterm Exams? Visit www.xondow.com and search from a large catalog of midterm and final exams. We have assignments, quizzes, homework problems and test banks for many Strayer courses. We provide top notch homeworkhelp assistance for Strayer University Students. For Final Exams visit: http://xondow.com/Final-Exams_c19.htm For Midterm Exams visit: http://xondow.com/Midterm- Exams_c18.htm For Test Banks visit: http://xondow.com/Test-Banks_c131.htm For Complete Classes visit: http://xondow.com/Complete- Class_c117.htm For any further assistance, send us an email at: [email protected]

description

SEC 402 Strayer - Includes Midterm and Final Exams - Strayer Latest

Transcript of SEC 402 Strayer - Includes Midterm and Final Exams - Strayer Latest

SEC 402 Strayer Test Bank

All Chapters included with answers.Purchase here: http://xondow.com/SEC-402-Strayer-Test-Bank-SEC402TB.htm

Need Help with Final Exams? Midterm Exams? Visit www.xondow.com and search from a large catalog of midterm and final exams. We have assignments, quizzes, homework problems and test banks for many Strayer courses. We provide top notch homeworkhelp assistance for Strayer University Students.For Final Exams visit:http://xondow.com/Final-Exams_c19.htmFor Midterm Exams visit:http://xondow.com/Midterm-Exams_c18.htmFor Test Banks visit:http://xondow.com/Test-Banks_c131.htmFor Complete Classes visit:http://xondow.com/Complete-Class_c117.htmFor any further assistance, send us an email at:[email protected]

All Chapters included with answers.Purchase here: http://xondow.com/SEC-402-Strayer-Test-Bank-SEC402TB.htm

SEC 402 Strayer Test BankChapter 1: Information Security is ImportantChapter 2: A Global Roadmap for SecurityChapter 3: Adapting the Best Practice: Tailoring a Solution That Fits

Chapter 4: Defining the Companys Executive Roles

Chapter 5: Defining the Companys Functional Security Roles

Chapter 6: Defining the Corollary Roles for Security

Chapter 7: The Data Security Competency

Chapter 8: The Digital Forensics Competency

Chapter 9: The Enterprise Continuity Competency

Chapter 10: The Incident Management Competency

Chapter 11: IT Security Training and Awareness

Chapter 12: Securing the IT Systems Operations and Maintenance Function

Chapter 13: Network and Telecommunications Security

Chapter 14: Personnel Security

Chapter 15: Physical Security

Chapter 16: Procurement

Chapter 17: Legal and Regulatory Compliance

Chapter 18: The Risk Management Competency

Chapter 19: Strategic Management

Chapter 20: System and Application Security

All Chapters included with answers.Purchase here: http://xondow.com/SEC-402-Strayer-Test-Bank-SEC402TB.htm

Chapter 1: Information Security is ImportantTRUE/FALSE

1.A SYN flood is characterized by the brute force transmission of requests for access to the target network, with the aim of overwhelming its capacity to receive them.

2.Computerized information is so tightly bound within the fabric of our society that its trustworthiness and availability has to be assured in order for our basic social functions to operate properly.

3.There is general agreement about what legitimately constitutes the right set of actions to deter hostile activity in cyberspace.

4.There been a standard definition of what constitutes due care in the information protection realm since the beginning of the discipline.

5.FISMA is a piece of legislation; therefore, as is the usual case with legislation, the actual means of implementing the federal law is left up to the National Institute of Standards and Technology (NIST).

MULTIPLE CHOICE

1.____ bundles mutually supporting government initiatives into a single coordinated effort to ensure the security of cyberspace and includes the establishment of a coordinated national capability to identify and remediate computer vulnerabilities.a.CHCI, 2008c.CNCI, 2008

b.CCNI, 2008d.CICN, 2008

2.Under the ____ rule, protection isnt adequate if any part of it can be exploited.a.complete protectionc.complete coverage

b.complete inspectiond.complete system

3.The normal way to make certain that a compromise does not happen is to put technical or ____ controls in place to ensure the security of all items that have to be protected.a.psychologicalc.personal

b.behaviorald.barrier

4.In order to operate properly, technical and behavioral controls have to be coordinated from within a single consistent ____.a.foundationc.resource

b.landscaped.framework

5.The problem with protecting information is that it is nothing more than a(n) ____ for something of value in the real world.a.parasitec.substitute

b.proxyd.analog

6.The first step in any cybersecurity process is to ____.a.get it properly organizedc.make the controls as strong as possible

b.get as much information as possibled.move as fast as possible

7.It is essential that the people responsible for assuring information follow a disciplined and well-defined ____.a.evacuationc.hierarchy

b.patternd.process

8.In order for a defense to be effective, all of the requisite ____ have to be in place and properly coordinated.a.assetsc.countermeasures

b.intrusionsd.backup controls

9.The ____ of a piece of information might be derived from the importance of the idea, or the criticality of the decision, or it can represent simple things like your bank account number.a.valuec.effectiveness

b.costd.assessment

10.A(n) ____ that only reflects the focus and interests of a single field will almost certainly have exploitable holes in it.a.offensec.control

b.defensed.mitigation

11.IT departments install technical countermeasures, but ____ have the responsibility to deploy accompanying physical security controls.a.oftenc.rarely

b.routinelyd.frequently

12.In most organizations, physical and electronic security involve ____ entirely separate and independent areas.a.twoc.four

b.threed.five

13.A reasonably accurate ____ of the important information that the organization considers valuable and where it is kept is important.a.inventoryc.hierarchy

b.surveyd.map

14.Any workable solution has to be ____.a.elegantc.detailed

b.practicald.complex

15.A security infrastructure should reflect the ____ needs of the business as well as its business requirements.a.technicalc.maturation

b.monetaryd.assurance

16.The role of ____ is to ensure that information resources that are needed to underwrite a particular business strategy are kept confidential, correct, and available.a.governancec.risk analysis

b.assuranced.cybersecurity

17.The aim of ____ is to maintain an optimum and secure relationship between each of the companys business processes and their respective information security functions.a.formal governancec.formal auditing

b.informal governanced.formal planning

18.Instead of being motivated by a desire to prove their art, hackers today are motivated by ____ and political ends.a.financial lossc.financial gain

b.reputationd.notoriety

19.____ is nothing more than the ability to demonstrate that all reasonable precautions were taken to prevent harm resulting from something that you are legally responsible for.a.Due carec.Due cause

b.Due securityd.Due justice

20.The EBK is a product of the Department of Homeland Securitys ____.a.National Security Divisionc.National Cyber Protection Division

b.National Cyber Analysis Divisiond.National Cyber Security Division

21.The specific purpose of the ____ is to implement the education and training requirements of the National Strategy to Secure Cyberspace.a.TBKc.ABK

b.EBKd.NBK

COMPLETION

1.The field of ____________________ is concerned with creating and sustaining processes that will identify emerging threats as well as provide the most practical and cost-effective countermeasures to address them.

2.In its simplest form, ____________________ ensures that the company is able to manage all of its information-related functions through a single coordinated approach.

3.Effective control of access requires the ability to ensure that access is only granted to ____________________ people.

4.The concept of due care is sometimes called due ____________________.

5.Ideally, a model for good cybersecurity practice would be ____________________ in its application.

MATCHING

Match each term with the correct statement below.a.Software engineeringf.Networking

b.Governanceg.Ethics

c.Business managementh.Traditional technical studies

d.Behavioral studiesi.FISMA

e.Law and law enforcement

1.Contributes concepts like security policy and procedure, continuity planning, personnel management, and contract and regulatory compliance to cybersecurity

2.Contributes knowledge about ways to safeguard the processing of information in its electronic form to cybersecurity

3.Adds essential recommendations about how to safeguard the electronic transmission and storage of information to cybersecurity

4.Adds process considerations like configuration management and lifecycle process security to cybersecurity

5.Contributes important ideas about intellectual property rights and copyright protection, privacy legislation, cyber law and cyber litigation, and the investigation and prosecution of computer crimes to cybersecurity.

6.Address essential human factors like discipline, motivation, training, and certification of knowledge in cybersecurity

7.Considers the personal and societal implications of information use and information protection with respect to cybersecurity

8.The process of establishing and maintaining the security framework.

9.An omnibus regulation for the federal government and its agencies.

SHORT ANSWER

1.Why is it important that all locations where a piece of information might exist be secured?

2.Discuss why having a defense that only reflects the focus and interests of a single field is a bad idea for an organization.

3.Discuss how to make sustainment of cybersecurity practicable.

4.Explain why it is a mistake to shift the responsibility for cybersecurity from senior management to the managerial level.

5.What was a typical cyberattack like in the 1990s?

6.List 5 of the 14 areas of common practice standardized in the EBK.

7.What was the main objection to the EBK?

8.Discuss the National Security Professional Development Program (NSPD).

9.Describe FISMA.

10.Discuss the role of NIST in the FISMA legislation.

All Chapters included with answers.Purchase here: http://xondow.com/SEC-402-Strayer-Test-Bank-SEC402TB.htm

Tags: final exams, midterm exams, test banks, strayer test banks, strayer final exams, strayer midterm, midterm, acc 307 midterm exams, acc 307 final exam, acc307, acc 307, acc 317, acc317 strayer, acc 317 midterm exam, acc 317 final exam, acc350 midterm exam, acc 350 final exam, acc350 strayer, acc 350, acc 410 midterm exam, acc 410 final exam, acc410 strayer, acc 410, acc 555 final exam, acc 555 midterm exam, acc 555, acc555 strayer, acc 564 midterm exam, acc564 final exam, acc 564 strayer, acc564, acc 565, acc 565 strayer, acc 565 midterm exam, acc565 final exam, bus 517, bus517 strayer, bus 517 midterm exam, bus517 final exam, bus 520, bus520 strayer, bus 520 midterm exam, bus520 final exam, cis 105 strayer, cis 105 midterm exam, cis210 final exam, cis 210 midterm exam, cis midterm, cis 210 strayer, cis 312, cis312, cis 312 strayer, cis 312 final, cis312 midterm, cis 517, cis 517 strayer, cis517 final, cis 517 midterm, eco100, eco 100, eco 100 midterm, eco 100 final, eco 100 strayer final, eco 450 final, eco450 midterm, eco 450 strayer, eco 550, eco550, eco 550 strayer, eco 550 final exam, eco 550 midterm, fin 317 final exam, fin 317 midterm, fin 317 strayer, leg 107 midterm exam, leg 107 strayer, leg107 final, leg 500 strayer, leg 500 final, leg 500 final exam, leg500 midterm, mkt 310 final exam, mkt 310 midterm exam, mkt 315 final, mkt 315 midterm, sec310 final, sec 310 final exam, sec 310 strayer, sec 310 midterm exam, sec 402, sec 402 strayer, sec 402 final exam, sec 402 midterm exam, mkt100, mkt 100 strayer, mkt 100 strayer test bank, mkt 100

tests bank, sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank