jueves, 9 de junio de 2016

Cybersecurity v1.1 Module 6 Quiz



Cybersecurity v1.1 Module 6 Quiz


This quiz covers the content of the videos presented in Cybersecurity Module 6. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.

Pregunta 1
Within an Enterprise Security Architecture, the Security Technology Architecture layer consists of five components. Three of these components are the framework, the conceptual requirements, and the logical requirements. What are the other two components? (Choose two.)
asset management
event management

implementation of the infrastructure
physical devices

standards and procedures

Pregunta 2
Refer to the exhibit. Rearrange the letters to fill in the blank.
A recommended Enterprise Security Architecture consists of 5 layers; Security Drivers, Security Program Management, Security Governance, Security
, and Security Technology Architecture.
Pregunta 3
True or False?
Recent trends show that those who conduct cyberattacks are getting better at evading detection.
true
false

Pregunta 4
List three (3) important facts about the Enterprise Security Architecture.
Final del formulario
Policy driven, Framework, Security architecture

Pregunta 5

Fill in the blank.
A recent study found that 1 out of
children in China aspire to become hackers.

Pregunta 6
What are the three strategic end goals of cybersecurity? (Choose three.)
stopping the creation of malware
preventing people from becoming hackers

preventing strategic collapse
deterring and disrupting hackers

protecting information assets

No hay comentarios:

Publicar un comentario