Wednesday, September 14, 2016

CyberSecurity and Mobility - Week 3 - Quiz

If you are looking for answers to these question do mention in the comment. But be specific while questioning. We can discuss about the possible answers.

1.
The most fundamental problem with mobile security is a lack of _______.

  • Awareness
  • Training
  • Symmetry
  • Diversity
Learn Marketing Mix Implementation with IE Business School and Coursera. Prepay and receive a 10% discount. Learn Investment Management with University of Geneva and Coursera. Prepay and receive a 10% discount. Learn Entrepreneurship with the Wharton School and Coursera. Prepay and receive a 10% discount.
2.
_________ unifies protection from all hazards to data health, whether intentional or accidental, within a data center or at a remote location.

  • PDL
  • DLP
  • PDR
  • DLC
Learn Algorithmic Programming Techniques with UCSD/HSE and Coursera. Prepay and receive a 10% discount. Learn Business English Skills with University of Washington and Coursera. Prepay and receive a 10% discount. Learn Business and Financial Modeling with The Wharton School and Coursera. Prepay and receive a 10% discount.
3.
______ is a type of malware that allows the perpetrator to monitor what the remote user does on the screen

  • MitMo
  • SitMo
  • MinMax
  • SimCity
Become a Digital Marketer in 2016 with Coursera. Become a Web Developer in 2016 with Coursera Data science is one of today‰Ûªs fastest-growing fields. Become a Data Scientist in 2016 with Coursera.
4.
Individuals using their own computers may be responsible for causing a security breach of __________.

  • Public data
  • Food data
  • Corporate data
  • Parking data
New Skills, New You: Transform your career in 2016 with Coursera Learn Corporate Finance with BNY Mellon and Coursera AnÌÁlisis de Datos con Tec de Monterrey MÌ©xico y Coursera
5.
A major challenge faced by security executives is the requirement to _________ the need to enable the business against the need to secure information assets.

  • Increase
  • Allow
  • Reduce
  • Balance
Ingl̩s Empresarial con ASU y Coursera Bienvenidos a Coursera en Espa̱ol Desarrollo y Dise̱o de Videojuegos con UniAndes y Coursera
6.
__________ is the practice of providing informal consulting and advisory services to other areas of the company.

  • Information security mentoring
  • Information security consulting
  • Information security monitoring
  • Information security gathering
Learn Social Media Marketing with Northwestern and Coursera Learn Business Analytics with UPenn and Coursera Master Big Data with UCSD and Coursera
7.
___________ is the ability to recover critical business operations with minimal long term disruption.

  • Disaster recovery
  • Business continuity
  • Operations management
  • Strategic recovery
Build New Business Skills on Coursera Discover Data Science with Coursera Master Computer Science on Coursera
8.
____________ is the ability to efficiently search, locate and recover key information within a given time interval, often as a result of a court order.

  • E-recovery
  • E-discovery
  • E-Channel
  • E-mail
Aprenda cieíância de dados e mais - Coursera Aprenda data science, marketing digital, e mais - Coursera Aprenda cieíância de dados e mais - Coursera
9.
_________ is an attempt to get users to click on a malicious link typically embedded in an e-mail or SMS.

  • Blocking
  • Phishing
  • Security token
  • Whitelisting

10.
__________ is the idea that each individual device should be secured, as opposed to centralized security, which emphasizes safety behind firewalls.

  • Securepoint security
  • System security
  • Endpoint security
  • OS security
Coursera Project Management - Qualify for 35 PDUs Coursera Project Management - First Step to a PMP Certificate Build Project Management Skills with Coursera
11.
To have a more holistic security strategy, a company needs to concentrate on the technical as well as the __________ context.

  • firewall
  • risk management
  • socio-organizational
  • cyber insurance

12.
A key aspect of aligning information security with the business is to develop a _________ that embraces the value and importance of security.

  • security program
  • cyber insurance program
  • culture
  • security policy
Learn Data Science, Digital Marketing, Business Foundations & More. Start Learning. Learn Data Science, Digital Marketing, Business Foundations & More. Start Learning. Learn Data Science, Digital Marketing, Business Foundations & More. Start Learning.
13.
Which of the following is a true statement about information security effectiveness (check all that apply):

  • security is a purely technical issue
  • no single technology or mechanism is sufficient
  • there is no “silver bullet”
  • security is a philosophical issue

14.
Which of the following is a true statement about data analytics?

  • It is an important driver of sales growth and financial performance.
  • Data analytics does not require governance policies.
  • It results in less data being analyzed.
  • Companies do not benefit from data analytics.
Coursera Purple CS Design 3 Coursera DS Design 10 Coursera Business Vertical Orange Design 10
15.
Based on what you have read in The Evolution of Information Governance at Intel, how was the firm able to migrate data to appropriate tiers?

  • Intel looked at the regulatory environment.
  • Users assigned values to data as part of a classification scheme.
  • Intel relied on randomly generated threat assessments.
  • Intel hired external consultants.

18 comments:

  1. Where are the ans. Of these questions

    ReplyDelete
  2. penetration testing Interesting post. I Have Been wondering about this issue, so thanks for posting. Pretty cool post.It 's really very nice and Useful post.Thanks

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. 1)awarness
    2)dlp
    3)mitmo
    4)corporate data
    5)balance
    6)information security mentoring
    8)E-discovery
    9)phishing
    10)endpoint security
    14)It is important....

    ReplyDelete
  5. Cool stuff you have and you keep overhaul every one of us.cyber security consultant firm

    ReplyDelete
  6. Very useful post. This is my first time i visit here. I found so many interesting stuff in your blog especially its discussion. Really its great article. Keep it up. It's very interesting post.this is my first time visit here.i found so many interesting stuff in your blog especially its discussion..thanks for the post!

    ReplyDelete
  7. 7, 11, 12, 13, 15
    ans plz

    ReplyDelete
  8. Thank you for precious information, Contact us today to learn more about our beneficial information about Cybersecurityand how we can help you protect your business.

    ReplyDelete