Question: 1. What type of malware is described as a program that installs other items on a machine that is under attack; usually sent in an

1. What type of malware is described as a program that installs other items on a machine that is under attack; usually sent in an email message?

a) Auto-rooter

b) Backdoor

c) Downloader

d) Dropper

2.Considering security architecture, which model consists of contextual, conceptual, logical, physical, and component areas?

a) SABSA

b) CIA

c) SSO

d) DMZ

3.What is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment?

a) Technical security controls

b) Security architecture

c) Security Policy

d) Security Management

4.What are benefits of EUDAs?

a) Security

b) Documentation

c) Demand for Information

d) All of the above

5.If an employee creates a spreadsheet to personally track their sales, what is this considered within the organization?

a) Information Subsystem

b) End user-developed application

c) Application Portfolio Matrix

d) System Analytics

6.What is true about End user-developed applications (EUDAs)?

a) They sometimes are created by a group within the department that is responsible for reporting or metrics calculations

b) These applications can go beyond reporting and actually augment or replace functionality contained in the formal system

c) These applications may be hosted on shared drives, workgroup folders, or internal websites, or they may simply be emailed around

d) All of the above

7.Which of the following tasks can help with external application security?

a) Enforce routing patching and maintenance cycles

b) Enforcement of virtual platform security

c) Encryption of network traffic using DES

d) All of the above

8.Which of the following tasks can help with internal application security?

a) Enforce routing patching and maintenance cycles

b) Enforcement of virtual platform security

c) Encryption of network traffic using DES

d) All of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!