Date of Issue: 10-01-2023 Rate this Study Guide


Question 1.
The ultimate objective in IT security is to ________.

a) Implement the best security possible
b) Learn how to hack into systems
c) Achieve a warm fuzzy feeling of confidence
d) Buy lots of cool toys to play with

Answer


Question 2.
The two ways of categorizing security threats are __________.

a) Trusted/Untrusted and Possible/Impossible
b) Interior/Exterior and Structured/Unstructured
c) Hacking/Cracking and DoS/DDoS
d) Professional/Unprofessional and Monetary/Non-monetary

Answer


Question 3.
The most important aspect of security is the ___________.

a) Security Planning
b) Security Posture
c) Firewall
d) Security Policy

Answer


Answers


Question 1.
The ultimate objective in IT security is to ________.

a) Implement the best security possible
b) Learn how to hack into systems
c) Achieve a warm fuzzy feeling of confidence
d) Buy lots of cool toys to play with

Answer
c) Achieve a warm fuzzy feeling of confidence

Explanation
While "implementing the best security possible" is an admirable goal, realistically, budget constraints probably will not allow it. "to achieve a warm fuzzy feeling of confidence" is the best answer. You've succeeded if you've done all that you can do, and are confident in the security policy and systems you've put in place.
[4185]


Question 2.
The two ways of categorizing security threats are __________.

a) Trusted/Untrusted and Possible/Impossible
b) Interior/Exterior and Structured/Unstructured
c) Hacking/Cracking and DoS/DDoS
d) Professional/Unprofessional and Monetary/Non-monetary

Answer
b) Interior/Exterior and Structured/Unstructured

Explanation
Most organizations categorize threats as internal or external. Law enforcement categorizes threats as structured or unstructured.
[4186]


Question 3.
The most important aspect of security is the ___________.

a) Security Planning
b) Security Posture
c) Firewall
d) Security Policy

Answer
d) Security Policy

Explanation
"The Security Policy" is the only answer that includes all aspects of security. The other answers are parts of the Security Policy.
[4187]


[IE-SEC-SQ1-F03]
[2001-09-25-02]


Copyright © 2001 Genium Publishing Corporation