CIS 462 Endless Education /uophelp.com CIS 462 Endless Education /uophelp.com | Page 14

• Question 22 You swipe your finger over your laptop ' s fingerprint reader to unlock the computer. Which type of authentication method are you using?
• Question 23 Authentication and encryption of intranet traffic is a _______ Domain issue.
• Question 24 In which IT domain do service level agreements help ensure the reliability and speed of a network connection?
• Question 25 In the Workstation Domain, ____________ is the best method of reducing the risk of information leakage.
• Question 26 In Kotter ' s change model, in which step does the ISO tune the message so the value of implementing the policy makes sense?
• Question 27 In Kotter ' s change model, which of the following is true as part of Step 1: Create urgency?
• Question 28 In an organization, which of the following roles is responsible for the day-to-day maintenance of data?
• Question 29 The basic elements of motivation include pride, success, and __________.
• Question 30 In Kotter ' s change model, in which step does the ISO work with line management to collect metrics for assessing the policies ' effectiveness and ensure metrics are meaningful?
• Question 31 Which personality type tends to be associated with good leaders?
• Question 32 Which of the following is not true of auditors?
• Question 33 To which sector does HIPAA apply primarily?
• Question 34 Which compliance law concept states that individuals should know what information about them is being collected and should be told how that information is being used?
• Question 35 Which of the following is not true of the Sarbanes- Oxley Act?
• Question 36 Which of the following is not a key component that must be covered in an organization ' s security policy for CIPA compliance?
• Question 37 Which law was challenged by the American Library Association and the American Civil Liberties Union claiming it violated free speech rights of adults?