CIS 462 Final Exam (2 Set) CIS 462 Final Exam (2 Set) | Page 5

• Question 37 Which U.S. military data classification refers to data that the unauthorized disclosure of which would reasonably be expected to cause serious damage to national security? • Question 38 ___________ is/are key to security policy enforcement. • Question 39 Your company does not want its employees to use the Internet to exchange personal e-mail during work hours. What is the best tool to use to ensure the company does not violate an employee's right to privacy? • Question 40 Which of the following is least likely to indicate the effectiveness of an organization's security policies? • Question 41 What is the name of a common control that is used across a significant population of systems, applications, and operations? • Question 42 Which employee role is directly accountable to ensure that employees are implementing security policies consistently? • Question 43 Your company wants to minimize the risk of its employees sharing confidential company information via e-mail. What is the best tool to use to minimize this risk? • Question 44 An employee used her company-owned computer to e-mail invitations to friends for her upcoming party, which violated the company's acceptable use policy. Who is responsible for correcting the employee's behavior?