Premium Essay

Issc431

In:

Submitted By ssgtsauer
Words 276
Pages 2
Part 1 of 1 - | 100.0 Points |

Question 1 of 15 | 7.0 Points | Which of the following is not a primary objective of information security? | | A.Confidentiality | | | B.Integrity | | | C.Privacy | | | D.Availability | | Answer Key: C | | | Question 2 of 15 | 7.0 Points | Which of the following has the ultimate and final responsibility for network security in an organization? | | A.IT management | | | B.Network administrator | | | C.Senior management | | | D.IT security staff | | Answer Key: C | | | Question 3 of 15 | 7.0 Points | Security ________ are goals an organization strives to achieve through its security efforts. | | A.baselines | | | B.guidelines | | | C.objectives | | | D.None of the above | | Answer Key: C | | | Question 4 of 15 | 7.0 Points | Which IT domain in a typical IT infrastructure typically includes routers, circuits, switches, firewalls, and equivalent gear at remote locations? | | A.LAN Domain | | | B.LAN-to-WAN Domain | | | C.WAN Domain | | | D.System/Application Domain | | Answer Key: C | | | Question 5 of 15 | 7.0 Points | The lack of ____________ is both a strength and weakness of workgroups. | | A.user accounts | | | B.peers | | | C.shared resources | | | D.central authority | | Answer Key: D | | | Question 6 of 15 | 7.0 Points | What does a client/server environment have that a peer-to-peer networking environment typically does not? | | A.server | | | B.workstations | | | C.hubs or switches | | | D.shared resources | | Answer Key: A | | | Question 7 of 15 | 7.0 Points | A _________ is a boundary network that hosts resource servers for the public Internet. | | A.DMZ | | | B.intranet | | | C.WAN | | | D.choke point | | Answer Key: A | | | Question 8 of 15 | 7.0 Points |

Similar Documents

Premium Essay

Issc431 Assignment

...Assignment 7: Key requirements for writing SQL server audits to Windows Security Log x American Military University ISSC 431 Professor Christopher Weppler 20 April 2016 Security audits are is a report that identifies and brings about weaknesses of an organization. Security audits allow companied to focus on items that they have to improve on. There are multiple types of security audits: informal audits, formal audits, internal audits, external audits and automated audits (Basta, 2011). Therefore the goal of an audit is to provide accurate view of the organizations internal security controls in order to improve the organization’s security plan. When an audit is first being conducted it needs to be first planned out and everyone needs to prepare for it. In the planning phase, the audit scope is determined. The systems, departments and items that are being audited are determined (Basta, 2011). Some examples of items that get audited are the web server management, e-mail server management, file server administration, web applications, server security, databases and many other components. Some vendors contain their own unique automatic tools in order to help the auditing go a little smoother, such as logging user and database activity. In Microsoft SQL server allows the function to track the logging activities throughout all levels of the database. In order to create audits in Microsoft SQL...

Words: 356 - Pages: 2