Information Security 1 answer below »
We're the ideal place for homework help. If you are looking for affordable, custom-written, high-quality and non-plagiarized papers, your student life just became easier with us. Click either of the buttons below to place your order.
Order a Similar Paper
Order a Different Paper
multiple choice
1. A ____ is a feature left behind by system designers or maintenance staff. (Points : 5) virus
sniffer
worm
back door
Question 2.2. ____ are used to create procedures. (Points : 5) Guidelines
Standards
Practices
Profiles
Question 3.3. A ____ program keeps information security at the forefront of users' minds on a daily basis. (Points : 5) security accountability
security education
security training
security awareness
Question 4.4. In ____, individuals act as if an actual incident occurred, and begin performing their required tasks and executing the necessary procedures, without interfering with the normal operations of the business. (Points : 5) a desk check
a simulation
a structured walk-through
parallel testing
Question 5.5. When a disaster threatens the viability of an organization at the primary site, the ____ is started. (Points : 5) crisis management process
business continuity process
incident response process
disaster recovery process