1.
The most fundamental problem with mobile security is a lack of _______.
- Awareness
- Training
- Symmetry
- Diversity
2.
_________ unifies protection from all hazards to data health, whether intentional or accidental, within a data center or at a remote location.
- PDL
- DLP
- PDR
- DLC
3.
______ is a type of malware that allows the perpetrator to monitor what the remote user does on the screen
- MitMo
- SitMo
- MinMax
- SimCity
4.
Individuals using their own computers may be responsible for causing a security breach of __________.
- Public data
- Food data
- Corporate data
- Parking data
5.
A major challenge faced by security executives is the requirement to _________ the need to enable the business against the need to secure information assets.
- Increase
- Allow
- Reduce
- Balance
6.
__________ is the practice of providing informal consulting and advisory services to other areas of the company.
- Information security mentoring
- Information security consulting
- Information security monitoring
- Information security gathering
7.
___________ is the ability to recover critical business operations with minimal long term disruption.
- Disaster recovery
- Business continuity
- Operations management
- Strategic recovery
8.
____________ is the ability to efficiently search, locate and recover key information within a given time interval, often as a result of a court order.
- E-recovery
- E-discovery
- E-Channel
9.
_________ is an attempt to get users to click on a malicious link typically embedded in an e-mail or SMS.
- Blocking
- Phishing
- Security token
- Whitelisting
10.
__________ is the idea that each individual device should be secured, as opposed to centralized security, which emphasizes safety behind firewalls.
- Securepoint security
- System security
- Endpoint security
- OS security
11.
To have a more holistic security strategy, a company needs to concentrate on the technical as well as the __________ context.
- firewall
- risk management
- socio-organizational
- cyber insurance
12.
A key aspect of aligning information security with the business is to develop a _________ that embraces the value and importance of security.
- security program
- cyber insurance program
- culture
- security policy
13.
Which of the following is a true statement about information security effectiveness (check all that apply):
- security is a purely technical issue
- no single technology or mechanism is sufficient
- there is no “silver bullet”
- security is a philosophical issue
14.
Which of the following is a true statement about data analytics?
- It is an important driver of sales growth and financial performance.
- Data analytics does not require governance policies.
- It results in less data being analyzed.
- Companies do not benefit from data analytics.
15.
Based on what you have read in The Evolution of Information Governance at Intel, how was the firm able to migrate data to appropriate tiers?
- Intel looked at the regulatory environment.
- Users assigned values to data as part of a classification scheme.
- Intel relied on randomly generated threat assessments.
- Intel hired external consultants.
Where are the ans. Of these questions
ReplyDeletePlease mention which question you are struggling with. I can help you out.
Deleteweek 3 answers please
DeleteWeek2
Deleteweek 3
Deleteweek 1
Deleteweek1
Deletepenetration testing Interesting post. I Have Been wondering about this issue, so thanks for posting. Pretty cool post.It 's really very nice and Useful post.Thanks
ReplyDelete13
ReplyDelete2
ReplyDeleteans plz
ReplyDeleteThis comment has been removed by the author.
ReplyDelete1)awarness
ReplyDelete2)dlp
3)mitmo
4)corporate data
5)balance
6)information security mentoring
8)E-discovery
9)phishing
10)endpoint security
14)It is important....
week 3 ans pls
ReplyDeleteCool stuff you have and you keep overhaul every one of us.cyber security consultant firm
ReplyDeleteVery useful post. This is my first time i visit here. I found so many interesting stuff in your blog especially its discussion. Really its great article. Keep it up. It's very interesting post.this is my first time visit here.i found so many interesting stuff in your blog especially its discussion..thanks for the post!
ReplyDelete7, 11, 12, 13, 15
ReplyDeleteans plz
Thank you for precious information, Contact us today to learn more about our beneficial information about Cybersecurityand how we can help you protect your business.
ReplyDelete