CIS 462 Final Exam (2 Set) CIS 462 Final Exam (2 Set) | Page 5
•
Question 37
Which U.S. military data classification refers to data that the
unauthorized disclosure of which would reasonably be expected to cause serious damage to
national security?
•
Question 38
___________ is/are key to security policy enforcement.
•
Question 39
Your company does not want its employees to use the Internet to
exchange personal e-mail during work hours. What is the best tool to use to ensure the
company does not violate an employee's right to privacy?
•
Question 40
Which of the following is least likely to indicate the effectiveness
of an organization's security policies?
•
Question 41
What is the name of a common control that is used across a
significant population of systems, applications, and operations?
•
Question 42
Which employee role is directly accountable to ensure that
employees are implementing security policies consistently?
•
Question 43
Your company wants to minimize the risk of its employees sharing
confidential company information via e-mail. What is the best tool to use to minimize this risk?
•
Question 44
An employee used her company-owned computer to e-mail
invitations to friends for her upcoming party, which violated the company's acceptable use
policy. Who is responsible for correcting the employee's behavior?