Question

In: Computer Science

MCQ's: 1.Which of the following is not a major benefit of SETA (Security, Education and Awareness)...

MCQ's:

1.Which of the following is not a major benefit of SETA (Security, Education and Awareness) programs?

A) They enable the organization to hold employees accountable B) They can inform members of the organization about where to report policy violations C) They can improve the configuration rule security for the organization D) They can improve employee behaviour.

2.When using the U.S. military classification scheme, which classification indicates that disclosure of contained information could cause minor or moderate damage to national security?

A) Confidential data B) Sensitive but unclassified data C) Top secret data D) Unclassified data

3.What term below is used to describe security efforts that are considered among the best in an industry?

A) Standard of due care B) Standard of due diligence C) Recommended business practices D) Best security practices

4.Which of the following is an example of a covert channel for communications that may exist within a computer system? -

. A) Diffie-Hellman key exchange B) Steganography C) Intrusion detection and prevention system D) Spoofing

Solutions

Expert Solution

1.C) They can improve the configuration rule security for the organization

  • SETA (Security, Education, and Awareness) programs increase the awareness of the employees in the organization about the importance of keeping their systems and resources secured.
  • Configuration rules are created by the organizations according to their parameters and hence SETA training doesn't improve them

2.A) Confidential data

  • National Security Information is classified at three levels and Confidential data is one of them

3.D) Best security practices

  • Best security practices are used to describe security efforts that are considered among the best in industry.

4.B) Steganography

  • A covert channel is a method of communication that enables the transfer of communication through a forbidden method by using a covering or hiding the actual data in any other piece of data.
  • Steganography is an example where the data is attached to any other object like an image file, video file or any other form of information in a concealed manner.

Related Solutions

Which of the following is not true about Social Security? The retirement benefit equals the average...
Which of the following is not true about Social Security? The retirement benefit equals the average monthly income of worker during their last ten years of employment Employers withhold Social Security taxes from employee paychecks and submit the funds to the IRS Self-employed workers must pay the full Social Security tax themselves each year Most people have to work for at least 10 years to receive full credit, which accrues at the rate of about four credits per year, depending...
1. Which of the following is not a CPP benefit? a. Retirement pension b. Survivor benefit...
1. Which of the following is not a CPP benefit? a. Retirement pension b. Survivor benefit c. Death benefit d. Allowance for survivor 2. Demi is a Canadian citizen. She has an RRSP account in which she has currently invested $5,000,000 in mutual funds. The real return on her mutual funds is expected to be 7% over the ten years until her retirement. If she doesn’t save any more between now and retirement, how much will her retirement shortfall be...
Following a recent network intrusion, a company wants to determine the current security awareness of all...
Following a recent network intrusion, a company wants to determine the current security awareness of all of its employees. Which of the following is the BEST way to test awareness? A. Conduct a series of security training events with comprehensive tests at the end B. Hire an external company to provide an independent audit of the network security posture C. Review the social media of all employees to see how much proprietary information is shared D. Send an email from...
Explain the importance of awareness when dealing with employees security. Provide an example of two security...
Explain the importance of awareness when dealing with employees security. Provide an example of two security policies that would help prevent internal employee fraud.
Research and include the following: Security Risk Mitigation Plan: Develop education plan for employees on security...
Research and include the following: Security Risk Mitigation Plan: Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training).
Are the following statements true or false? (a) The Social Security benefit formula works to the...
Are the following statements true or false? (a) The Social Security benefit formula works to the advantage of low-wage workers. (b)Compared to those with higher earnings, on average, low-wage workers are more likely to pay thousands of dollars in Social Security taxes and then die before, or soon after, becoming eligible for retirement benefits. (c) Social Security works to the disadvantage of groups with below average life expectancy.
Which of the following is an externality aspect of education? A. Education produces a return to...
Which of the following is an externality aspect of education? A. Education produces a return to society that is greater than the return to the individual. B. Education produces costs to society that are greater than the costs to the individual. C. Education produces a return to society that is less than the return to the individual. D. Education produces costs to the individual that are greater than the costs to society. \
The retirement benefit of the Social Security program is considered a progressive benefit with a regressive...
The retirement benefit of the Social Security program is considered a progressive benefit with a regressive financing scheme. (1) How is the Social Security benefit progressive? (2) How is its financing scheme regressive?  
Which of the following is not a benefit of a not-for-profit organization?
Which of the following is not a benefit of a not-for-profit organization?
How can a security professional cultivate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders?
How can a security professional cultivate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders? Present several examples, including rationale. 
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT