Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 16 1. Which of the following risks is typically found in the User Domai

ID: 3902143 • Letter: Q

Question

QUESTION 16

1. Which of the following risks is typically found in the User Domain?

A. Software vulnerabilities

B. Humans and human nature

C. Network vulnerabilities

D. Unauthorized access to equipment

QUESTION 17

1. Dealing with employee apathy toward __________ is a risk that is typically found in the User Domain.

A. information systems security policy

B. operating system software vulnerabilities

C. application software vulnerabilities

D. using USB drives containing personal data on company computers

QUESTION 18

1. Implementing an e-mail filtering and quarantining system that examines embedded URL links inside e-mails and examines unknown file attachments in e-mails would be a security control to mitigate risks in the:

A. LAN Domain.

B. LAN-to-WAN Domain.

C. User Domain.

D. Workstation Domain.

QUESTION 19

1. Operating system software vulnerabilities and application software vulnerabilities are risks and threats that are typically found in the:

A. LAN Domain.

B. LAN-to-WAN Domain.

C. User Domain.

D. Workstation Domain.

QUESTION 20

1. Implementing content filtering and intrusion detection/intrusion prevention systems at the Internet ingress/egress as well as disabling system administration rights on user workstations are strategies that can be used for preventing users from:

A. downloading and installing unauthorized applications and software onto organization-owned IT assets.

B. inserting CDs, DVDs, and USB drives with personal data onto organization-owned IT assets.

C. accessing the Internet and surfing the Web.

D. clicking on unknown e-mail attachments and files.

Explanation / Answer

Question 16:-

B. Humans and Human Nature.

Question 17:-

A. information systems security policy

Question 18:-

A. LAN Domain

Question 19:-

D. Workstation Domain.

Question 20:-

A. downloading and installing unauthorized applications and software onto organization-owned IT assets.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote