CIS 462 Endless Education /uophelp.com CIS 462 Endless Education /uophelp.com | Page 6

CIS 462 Final Exam Guide Set 2
• Question 1 What is the most reasonable way to deal with outdated technology that cannot conform to an organization ' s security policies ?
• Question 2 To be effective , which of the following must follow security policies ?
• Question 3 Conducting __________ can be an effective security awareness program solution .
• Question 4 Accountability , lack of budget , lack of priority , and tight schedules are examples of ____________.
• Question 5 The primary objective of a security awareness program is to _________.
• Question 6 What is a common consequence of failing to adhere to an acceptable use policy ( AUP )?
• Question 7 What is a benefit of instructor-led classroom training for security awareness ?
• Question 8 Which of the following is generally not a part of a security awareness communications plan ?
• Question 9 Which of the following methods is used to track compliance ?
• Question 10 Which organization maintains the Common Vulnerabilities and Exposures ( CVE ) list ?
• Question 11 Best practices for IT security policy compliance monitoring includes ___________.
• Question 12 Three major components of the ITIL life cycle are service transition , service operation , and service _________.
• Question 13 You want to identify active hosts on a network , detect open ports , and determine the operating system in use on servers . Which is the best tool to use ?
• Question 14 Nessus ® is a type of _______________.
• Question 15 Your company wants to minimize the risk of its employees sharing confidential company information via e-mail . What is the best tool to use to minimize this risk ?