Security Practices and Legal Compliance in Information Management

Discusses security practices and legal compliance.

Lily Green
Contributor
4.7
41
5 months ago
Preview (2 of 5 Pages)
100%
Purchase to unlock

Page 1

Security Practices and Legal Compliance in Information Management - Page 1 preview image

Loading page image...

Security Practices and Legal Compliance in Information ManagementQuestion Type:# Of Questions:# Correct:Multiple Choice1010Grade Details-All QuestionsQuestion1.Question :(TCO 2) Which of the following isnot an example of a poorsecuritypractice?Student Answer:The user does not follow established security policies orprocesses.There is a lack of security policies, procedures, or training withinthe user's organization.An employee does not allow aperson he or she is talking with toenter a secured area before showing proper credentials.An employee creates one good password and then uses it for allof his or her accounts.InstructorExplanation:Page 77Points Received:3 of 3Comments:Question2.Question :(TCO 2) An attacker watches people as they enter a building thatrequires a key card. The attacker waits until she sees someone whoappears to be in a rush and hashis hands full. She thenintercepts theperson, makes quick small talk, offers to helphim hold what's inhishands while he swipes in, and follows behind. This is an example of_____.Student Answer:spear phishingpharmingpiggybackingmantrappingInstructorExplanation:Page 73

Page 2

Security Practices and Legal Compliance in Information Management - Page 2 preview image

Loading page image...

Preview Mode

This document has 5 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all