Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
Who dictates policy? (D5.3, L5.3.1)A) The security managerB) The Human Resources officeC) Senior managementD) Auditors
_____________ adds user location information to logs.A) CachingB) HashingC) GeotaggingD) Stickies
By far, the most crucial element of any security instruction program. (D5.4, L5.4.1)A) Protect assetsB) Preserve health and human safetyC) Ensure availability of IT systemsD) Preserve shareholder value
When data has reached the end of the retention period, it should be _____. (D5.1, L5.1.1)A) DestroyedB) ArchivedC) EnhancedD) Sold
Security needs to be provided to ____ data. (D5.1, L5.1.1)A) RestrictedB) IllegalC) PrivateD) All
True or FalseA Emergency Workflow is when an administrator disables accounts immediately when a user is unexpectedly terminated.A) TrueB) False
Data retention periods apply to ____ data. (D5.1, L5.1.1)A) MedicalB) SensitiveC) AllD) Secret
Proper alignment of security policy and business goals within the organization is important because: (D5.3, L5.3.1)A) Security should always be as strict as possibleB) Security policy that conflicts with business goals can inhibit productivityC) Bad security policy can be illegalD) Security is more important than business
Attestation reviews formal approval documentation.A) TrueB) False
What type of lock always requires entering a code to enter the facility?A) Magnetic stripe card lockB) Proximity card lockC) Biometric lockD) Cipher lock
What set of principles uses the built environment to improve security?A) CSAB) NSAC) CPTEDD) NIST
Two people must enter sensitive areas together is known as what?A) Two Person IntegrityB) Two Person Control
During the offboarding process, administrators disable accounts and revoke authorizations at the appropriate time. What is this known as?A) DeprovisioningB) ProvisioningC) SetupD) Installation
After onboarding, administrators create authentication credentials and grant appropriate authorization. What is this known as?A) DeprovisioningB) ProvisioningC) SetupD) Installation
True or FalseA Routine Workflow is when an administrator disables accounts on a scheduled basis for planned departures.A) TrueB) False
_____________ alerts when a device leaves defined boundaries.A) NIDSB) FirewallsC) GeofencingD) Routers
Two people must jointly approve sensitive actions is known as what?A) Two Person IntegrityB) Two Person Control
Carol is browsing the Web. Which of the following ports is she probably using? (D4, L4.1.2)A) 12B) 80C) 247D) 999
Which of these is the most important reason to conduct security instruction for all employees. (D5.4, L5.4.1)A) Reduce liabilityB) Provide due diligenceC) It is a moral imperativeD) An informed user is a more secure user
If two people want to use asymmetric communication to conduct a confidential conversation, how many keys do they need? (D5.1, L5.1.2)A) 1B) 4C) 8D) 11
