AH356 Week 7 Exam…
1. Information security evolved from the early field of:
A) Computer Security
B) Micro-Economics
C) Data Analysis
D) None of the above
2. To make sound
decisions about information security, management needs to be informed about
threats to its:
A) Market standing, competition, and computer viability.
B) People, applications, data, and information systems
C) Information systems, computer infrastructure, and
regulatory policies.
D) All of the above
3. Policies must be read and agree to before they are:
A) Implemented
B) Published
C) Disseminated
D) Binding
4. The_________________should be a driving force in the
planning and governance activities of the organization as a whole.
A) Enterprise analysis policy
B) Enterprise information security policy
C) Information governance
D) Management computer exception policy
5. Which of the following is one of the five groupings of
firewalls:
A) Packet filtering
B) Exceptional logic base
C) Static hybrid
D) None of the above
6. The process of
determining how to admit a user into a trusted area of the organization is
known as:
A) Mandatory reporting
B) Firewall protection
C) User permission
D) None of the above
7. Decoy systems
designed to lure attackers away from critical systems are known as:
A) Trap and trace
B) Active intrusion protection
C) Honeypots
D) Sitting ducks
8. There are three
basic types of fire detection systems; thermal detection, smoke detection, and:
A) Heat detection
B) Flame detection
C) Both A and B
D) None of the above
9. If multiple copies of a classified document are made,
they should be:
A) Numbered and tracked
B) Destroyed upon reading
C) Available only through subpoena
D) Given only to management
10. The model that is
a proven method for prioritizing a program of complex change is known as
the_____________model.
A) Governance
B) Security
C) Bull’s eye
D) ISO 27001