Day 41 Back to Exams Page 1. An ______ policy states the allowed and disallowed uses of company resources.off boardingon boardingacceptable useinternal useQuestion 1 of 13 2. The goal of a ______ policy is to have another employee take over the responsibilities of sensitive employees roles, increasing the likelihood that any improper activity will be detected, while simultaneously discouraging these types of activities.job rotationjob swapmandatory vacationrole reversalQuestion 2 of 13 3. The principle of ____ privilege in data security states that each user should have the rights necessary to do all he or she is required to do, and no more.bottomlowestleastreversedQuestion 3 of 13 4. The greatest additional risk with cloud computing is _______.lack of built in securitythe loss of the physical control of datalack of support for vpnslack of support for remote accessQuestion 4 of 13 5. A well-implemented change management system (CMS) protects against ad-hoc configuration errors and can provide a method to roll back undesirable changes.TrueFalseQuestion 5 of 13 6. In addition to regular user rights and permissions reviews, other regular information security audits should take place.TrueFalseQuestion 6 of 13 7. For basic network forensics, any relevant videos should be regularly wiped clean.TrueFalseQuestion 7 of 13 8. Passwords should be memorized or physically secured.TrueFalseQuestion 8 of 13 9. Shoulder surfing attacks can be partially mitigated by masking passwords, a process by which the actual password displayed is a series of asterisks.TrueFalseQuestion 9 of 13 10. The length of time any particular outage renders services unavailable is known as the ______ time.recoveryoutagedownsystemQuestion 10 of 13 11. One of the most basic ways of increasing uptime is by removing ______.legacy equipmentbottleneckssingle points of failurefirewallsQuestion 11 of 13 12. RAID _ is the ultimate in redundancy. It performs a 1:1 mirroring of data from the original drive to each additional drive in the array, thus improving not only redundancy but also read times (not write times).0125Question 12 of 13 13. The second component of the CIA model is _______.inumerationinfosecintegrityintelligenceQuestion 13 of 13 Loading...