Identify changes in the behavior of the network

Assignment Help Management Information Sys
Reference no: EM132029893

1. Microsoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users.

group policy

change management policies

configuration management policies

Simple Network Management Protocol (SNMP)

2. When new policies are introduced into an organization, the culture is forced to change. This change entails requiring individuals to cease bad habits and adopt new ways to cope with risk.

True
False

3. ___________________ make use of baselines to identify changes in the behavior of the network.

Anomaly-based intrusion detection systems

Protocols

Authenticated configuration scanners

Misconfiguration remediation

4. The Gramm-Leach-Bliley Act (GLBA) was created to protect confidentiality and security of customer information. Thus, under GLBA, organizations are required to inform regulators quickly if any unauthorized access or breach has occurred. Consider this scenario: A bank teller accesses a customer account out of curiosity. What is best course of action following this event?

The bank should notify the regulator based on the threshold set for the how many records can be subject to unauthorized access.

The bank should notify the teller that she is to be terminated immediately and investigated for suspicious activity.

The bank should notify the regulator immediately because the teller has exhibited suspicious activity.

The bank should notify the regulator because it is evidence that a pervasive control weakness exists.

5. In order to build security policy implementation awareness across the organization, there should be ____________________ who partner with other team and departments to promote IT security through different communication channels.

many HR department personnel

numerous marketing department professionals

multiple executive supporters

several IT department specialists

6. __________________ is a term that denotes the way that a policy either diminishes business disruptions or facilitates the business's success.

Risk and control self-assessment

Business risk

Bolt-on

Compliance

7. While there are many ways that policy objectives and goals can be described, some techniques are more effective than others for persuading an organization to implement them. Which of the following is not one of the effective techniques for persuading people to follow policy objectives and goals?

giving an explanation how the policy will minimize business risk

explaining how the policy will guarantee that the business complies with laws and regulations

explaining how the policy will safeguard against or locate IT security threats

explaining the careful process of design and approval that went into creating the polices

8. A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives.

threat vector

target state

agent

communications plan

9. After management has created and agreed upon its policies, it must then determine how these policies will be implemented. Which of the following is not one the processes that line management will follow in order to make the new policies operational?

It will ensure that all members on the front-line team have received training.

It will take on the responsibility of being the point person for contact.

It will ensure that users with the most sensitive security access especially adhere to the policies.

It will apply the policies in an even and consistent manner.

10. During the process of developing a communications plan, it is necessary to ask the question, __________________.

"Who is communicating?"

"What is the intended message?"

"What is the target audience?"

"How is it communicated?"

Reference no: EM132029893

Questions Cloud

What should the new reorder point be : The hospital is concerned with fluctuating demand and would like to maintain safety stock with a 95% service level. If the historical standard deviation.
Direction of the ball velocity at the times : Using the approximate value of g = 10 m/s2, what are the magnitude and direction of the ball's velocity at the following times?
Record the journal entries required by the two companies : Crafts R Us notifies Bird Houses that 40% of the merchandise has been sold for $215,000. Record the journal entries required by the two companies
How many total dollars of dividends should joe expect : ABC Incorporated just paid a dividend of $1.59 on its common stock. Joe forecasts that the dividends for ABC will grow at a constant rate of 10.3%.
Identify changes in the behavior of the network : This change entails requiring individuals to cease bad habits and adopt new ways to cope with risk.
Maneuver designed to confuse opponent : During a wrestling match, a 158 kg wrestler briefly stands on one hand during a maneuver designed to confuse his opponent.
Calculate the gain or loss to be recognized by rogers co : Rogers Co. had a sheet metal cutter that cost $113,000 on January 5, 2010. Calculate the gain or loss to be recognized by Rogers Co
Calculate the geometric average annual return : Calculate the arithmetic average annual return. Calculate the geometric average annual return.
What is the force required to push the block at a constant : If the coefficient of kinetic friction is 0.02, what is the force required to push the block at a constant speed?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd