CIS 462 Endless Education /uophelp.com CIS 462 Endless Education /uophelp.com | Page 10

( 6) Which of the following is optional, and sets the parameters within which the others can be used?( 7) Which of the following is not true of segmented networks?( 8) You are on the West Coast but want to connect to your company’ s intranet on the East Coast. You use a program to“ tunnel” through the Internet to reach the intranet. Which technology are you using?( 9) A policy that addresses the use of personal mobile devices, such as a smartphone, to access an internal business network is an issue of which IT domain?( 10) After entering your user name and password, you enter a number displayed on a security token to gain access to your company’ s network. Which type of authentication method does the security token represent?( 11) In the Workstation Domain, ____________ is the best method of reducing the risk of information leakage.( 12) Authentication and encryption of intranet traffic is a _______ Domain issue.( 13) __________ is the ability to reasonably ensure conformity and adherence to both internal and external policies, standards, procedures, laws, and regulations.( 14) What is included in an IT policy framework?( 15) Incident reporting, incident management, and user ID addition / removal are examples of which of the following?( 16) Which of the following are written instructions on how to comply with standards?( 17) What is something you can measure against to demonstrate value, such as gauging if you’ ve reasonably covered risks in your organization?( 18) Which personality type tends to be best suited for delivering security awareness training?( 19) In Kotter’ s change model, which step is generally part of informal discussions rather than part of the formal implementation process?( 20) A primary reason why security policies often fail is ___________.( 21) Which of the following is not true of security policy enforcement?