As mentioned in the section "How to Use This Book" in the Introduction, you have two choices for review questions: the Q&A questions here or the exam simulation questions on the CD-ROM. The questions that follow present a bigger challenge than the exam itself because they use an open-ended question format. By using this more difficult format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. You can find the answers to these questions in the appendix.

1. Network security is the fine art of balancing security versus_.

2. The policy that details information about software and hardware standards utilized within an organization and how they are installed is called_.

3. A new vulnerability has come out, and the equipment that is being managed is vulnerable. What item will help to guide your actions to resolve this vulnerability?

4. What is the biggest benefit and business driver for network security from a manager's perspective?

5. One of the goals of a security policy is to define consequences for_. This can be in the form of management or human resources discipline, demotion, or termination.

6. The security policy must have support from_because lack of such may impede various business functions or processes.

7. Security polices should define user access and control not by their position, but by what factor?

8. The security policy needs to be specific to define all the requirements, but it must also be_to respond to the industry.

9. So that an organization can respond quickly and efficiently to an exposed vulnerability or a suspected compromise of a network resource, the network security policy should also contain an_.

10. Network security is considered a_because organizations are expected to ensure that personal information is kept secure from public access or leakage. Any leakage of this information may result in legal actions.



0 0

Post a comment