Now that you have finished reviewing all course material, it’s time to take the final exam. You must score 70% or higher to pass this exam. You will have an unlimited number of attempts to pass and there is no time limit for each attempt. Once you pass, you will receive a certificate of completion. Good luck!
0 of 20 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 20 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
You must score 70% or higher to pass this exam. You get unlimited attempts to pass. Please review the course material and attempt this exam again. Once you pass, you will receive a certificate of completion. Click the Restart Quiz button to take this quiz again.
Congratulations – You Passed the Course Exam. Click the “Continue” button to view your certificate of completion.
Software vulnerabilities in web and mobile applications and application programming interfaces (APIs) as addressed in what area of information security?
What is the process of numerically analyzing the identified risks to determine the probability or likelihood of those risks occurring?
What is the process of determining the risks that may affect the security of your network and the company data?
What is the process of putting the risk response plan into action?
What risk process addresses controlling the actual harm from any given risk?
Which of the following is not an aspect of risk control?
What is the action that prevents the disclosure of data to unauthorized individuals?
What security mechanism is used to determine user privileges or access levels related to the system resources that specific users are allowed to access?
Which of the following is not one of the types of important information sought out by criminals?
Which of the following types of network security encompasses the algorithms and software tools that are used to detect patterns of data transmissions in a network that are out of the “usage norm”?
Which of the following types of network security encompasses the utilization of different types of software in order to detect and prevent potential data breaches and the transfer of information in ways that are unsafe or unauthorized?
What is the first recommended action for establishing email security for a business?
What is the first best-practice that individuals can use for better email security?
What is the process of splitting a computer network into smaller sections in order to improve network security?
Which of the following activities would include locking doors and placing network equipment in cabinets with locks?
Which is the least effective and secure method for removing information from a hard drive?
Which of the following is not required to safely dispose of mobile phones and tablets?
What portion of the information security risk management plan is a hierarchical structure of project risks, organized by major category and then by subcategory?
What is the output or the end result of the identify risks process?
What is the most important line of defense to protect computers from hackers and cybercriminals?