CIS 462 Final Exam (2 Set) CIS 462 Final Exam (2 Set) | Page 6

• Question 45 What is a disadvantage of hard-coding a user name and password into an application to simplify guest access? • Question 46 What is an example of "hardening"? • Question 47 Which type of agreement would you have a contract system administrator (temporary worker) sign? • Question 48 of offensive content? Which of the following is a policy that prohibits access or storage • What is pretexting associated with? Question 49 • Question 50 Who evaluates an organization's technology controls and risks for compliance with internal security policies or regulations? CIS 462 Final Exam Guide Set 2 • Question 1 What is the most reasonable way to deal with outdated technology that cannot conform to an organization's security policies? • Question 2 To be effective, which of the following must follow security policies? • Question 3 Conducting __________ can be an effective security awareness program solution. • Question 4 Accountability, lack of budget, lack of priority, and tight schedules are examples of ____________.