CIS 462 Final Exam Guide Set 2
• Question 1 What is the most reasonable way to deal with outdated technology that cannot conform to an organization ' s security policies?
• Question 2 To be effective, which of the following must follow security policies?
• Question 3 Conducting __________ can be an effective security awareness program solution.
• Question 4 Accountability, lack of budget, lack of priority, and tight schedules are examples of ____________.
• Question 5 The primary objective of a security awareness program is to _________.
• Question 6 What is a common consequence of failing to adhere to an acceptable use policy( AUP)?
• Question 7 What is a benefit of instructor-led classroom training for security awareness?
• Question 8 Which of the following is generally not a part of a security awareness communications plan?
• Question 9 Which of the following methods is used to track compliance?
• Question 10 Which organization maintains the Common Vulnerabilities and Exposures( CVE) list?
• Question 11 Best practices for IT security policy compliance monitoring includes ___________.
• Question 12 Three major components of the ITIL life cycle are service transition, service operation, and service _________.
• Question 13 You want to identify active hosts on a network, detect open ports, and determine the operating system in use on servers. Which is the best tool to use?
• Question 14 Nessus ® is a type of _______________.
• Question 15 Your company wants to minimize the risk of its employees sharing confidential company information via e-mail. What is the best tool to use to minimize this risk?