Creating a Company Culture for Security >> IT Security: Defense against the digital dark arts
Question 1
What characteristics are used to assess the severity of found vulnerabilities? Check all that apply.
Question 2
What risk are you exposing your organization to when you contract services from a third party?
Question 3
What are some behaviors you should encourage in order to build a security-conscious culture? Check all that apply.
Question 4
When handling credit card payments, your organization needs to adhere to the _____.
Question 5
In the Payment Card Industry Data Security Standard (PCI DSS), which of these goals would benefit from encrypted data transmission?
Question 6
Which of these are examples of security tools that can scan computer systems and networks for vulnerabilities? Check all that apply.
Question 7
Which of these are bad security habits commonly seen amongst employees in the workplace? Check all that apply.
Question 8
What are some ways to combat against email phishing attacks for user passwords? Check all that apply.
Question 9
Management wants to build a culture where employees keep security in mind. Employees should be able to access information freely and provide feedback or suggestions without worry. Which of these are great ideas for this type of culture? Check all that apply.
Question 10
The very first step of handling an incident is _____ the incident.
Question 11
The incident response team found malware on several user workstations. Trying to remove the malware infection is becoming time consuming. There is important data on the workstations. Which of these actions will recover the workstations back to a malware-free state? Check all that apply.
Related Questions & Answers:
- Defense in Depth Defense in Depth >> IT Security: Defense against the digital dark arts Question 1 How are attack vectors and attack ... Read more...
- Understanding Security Threats Understanding Security Threats >> IT Security: Defense against the digital dark arts Question 1 Phishing, baiting, and tailgating are examples ... Read more...
- AAA Security (Not Roadside Assistance) AAA Security (Not Roadside Assistance) >> IT Security: Defense against the digital dark arts Question 1 Authentication is concerned with ... Read more...
- Creating a Company Culture for Security – Design Document Creating a Company Culture for Security – Design Document >> IT Security: Defense against the digital dark arts 1. Question ... Read more...
- Interconnecting Networks Interconnecting Networks >> Elastic Google Cloud Infrastructure: Scaling and Automation 1. What is the purpose of Virtual Private Networking (VPN)? ... Read more...
- Which of the following is not a Google Cloud load balancing service? 1. Which of the following is not a Google Cloud load balancing service? 1 / 1 point HTTP(S) load balancing SSL proxy ... Read more...