Question 2 AUP stands for? Active Use Personnel All Unscheduled Plans Active Use
ID: 3756314 • Letter: Q
Question
Question 2
AUP stands for?
Active Use Personnel
All Unscheduled Plans
Active User PC
Acceptable Use Policy
1 points
Question 3
An attempt by a threat agent to exploit assets without permission is referred to as:
an attack
a vulnerability
a safeguard
a trade-off
1 points
Question 4
Car ignition Locks are an example of what type of decision:
Requirements Based
Relativistic Based
Rule Based
Hunter’s Dilemma
1 points
Question 5
Which terminology are correct logical opposites?
Authorization and Accountability
Identification and Integrity
Availability and Identification
Confidentiality and Disclosure
1 points
Question 6
Which documentation review definition is NOT correct?
Policy: all servers must be properly hardened by patching and turning off services
Baseline: the specific settings for windows 2003 should match those in the CIS security template
Standard: administrators must use Windows 2003 as the base operating system
Procedures: to ease the application of templates, local GPOs can be used to roll out the changes
1 points
Question 7
A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a:
script kiddy
cracker
black-hat hacker
white-hat hacker
1 points
Question 8
A risk assessment involves which of the following:
identifying risks
prioritizing risks
identifying protection solutions
all the above
1 points
Question 9
A security analyst is performing a security assessment. The analyst should not:
get written authorization from the organization to verify that the assessment should take place
take actions to mitigate a serious risk
protect all working notes
securely erase all collected information that’s not needed for business purposes
1 points
Question 10
What is a worm?
Malware
Send Spam
Blocks flow of computer traffic
Denial of Service
1 points
Question 11
What is the formula for risk?
Threat = risk x vulnerability
vulnerability = threat x risk
risk = threat x vulnerability
1 points
Question 12
Victims can protect themselves against zero-day attacks.
True
False
1 points
Question 13
Which data classification role is responsible for the asset of information that must be protected?
Owner
Custodian
Analyst
Auditor
1 points
Question 14
An example of something you have would be?
GPS
Retina Scans
Passwords
Tokens
1 points
Question 15
OCTAVE is a:
security architecture
code of conduct
risk-assessment process
type of layered defense
1 points
Question 16
When disclosing a security vulnerability in a system or software, the manufacturer should avoid:
patching the system of software
including enough detail to allow an attacker to exploit the vulnerability
notifying customers
all of the answers
1 points
Question 17
Information security does NOT need to be maintained when third parties have access to information.
True
False
1 points
Question 18
________ are the exposure points (gateways) by which threats are manifested.
Vulnerabilities
Threats
Compromises
Risks
1 points
Question 19
The four categories of authentication are something you have, something you are, something you know, and someplace you are.
True
False
1 points
Question 20
People can be threat agents in some cases but trustworthy in others.
True
False
Active Use Personnel
All Unscheduled Plans
Active User PC
Acceptable Use Policy
Explanation / Answer
Please Note: The post contains more than One Question and thus according to the Chegg Answering Guidelines, I should answer the first question here. I have answered the first 4 questions here. For receiving the answers to the rest of the Questions, please Re-post for the other Questions.
Question 2
AUP stands for?
Active Use Personnel
All Unscheduled Plans
Active User PC
Acceptable Use Policy
Answer)
AUP - Acceptable Use Policy.
Question 3
An attempt by a threat agent to exploit assets without permission is referred to as:
an attack
a vulnerability
a safeguard
a trade-off
Answer)
A. an attack - is an attempt by a threat agent to exploit assets without permission.
Question 4
Car ignition Locks are an example of what type of decision:
Requirements Based
Relativistic Based
Rule-Based
Hunter’s Dilemma
Answer)
Rule-Based - an example of Car ignition Locks
Question 5
Which terminology is correct logical opposites?
Authorization and Accountability
Identification and Integrity
Availability and Identification
Confidentiality and Disclosure
Answer)
Confidentiality and Disclosure - is a terminology for correct logical opposites
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.