CIS 462 Final Exam (2 Set) CIS 462 Final Exam (2 Set) | Page 6
•
Question 45
What is a disadvantage of hard-coding a user name and password
into an application to simplify guest access?
•
Question 46
What is an example of "hardening"?
•
Question 47
Which type of agreement would you have a contract system
administrator (temporary worker) sign?
•
Question 48
of offensive content? Which of the following is a policy that prohibits access or storage
• What is pretexting associated with?
Question 49
•
Question 50
Who evaluates an organization's technology controls and risks for
compliance with internal security policies or regulations?
CIS 462 Final Exam Guide Set 2
• Question 1 What is the most reasonable way to deal with outdated technology that cannot
conform to an organization's security policies?
• Question 2 To be effective, which of the following must follow security policies?
• Question 3 Conducting __________ can be an effective security awareness program
solution.
• Question 4 Accountability, lack of budget, lack of priority, and tight schedules are examples
of ____________.