physical security​ subject

User Generated

fnawnxhzne

Computer Science

Description

physical security subject see the images it is a quiz please help me out

Unformatted Attachment Preview

x pa Week 3 Due 9/17 11:59 Take Test: Week 3 Lab G PCI DSS is a law that A Secure https://ucumberlands blackboard.com/webapps/assessm t/take/launch.jsp?course assessment id=6B020 18 course id= 92763_18.00 Apps lab 1 worksheet:EM W Free splunk training Question Completion Status Question 1 DSS is a law that provides for civil and criminal penaltes if merchants don't protect customer credit card data True False Question 2 The purpose of the NIST SP 800-37 is to provide guidance to Federal agencies for applying the Risk Management Framework to information systems True False Question 3 Which of the following is not a main goal of PCI DSS a Protect cardholder data b. Build and maintain a compliant secure network for handling credit cards Implement strong access controls d. Monitor credit card activity Question 4 Which is not a way to protect cardholder data Save and Submit Click Save and Submit to save and submit. Click Save All Answers to save all answers. . O Type here to search e FS F6 F11 & 3 6 8 QWER Bh Week 3 Due 9/17 11:59 Take Test: Week 3 Lab Q. X G PCI DSS is a law that pro 个 G Secure https://ucumberlands.blackboard.com/webapps/assessment/take/launch.jsp?course assessment_id=_68020 5: Apps * lab 1 worksheet: EM W Free splunk training Question Completion Status Question 4 Which is not a way to protect cardholder data a Limit display of the credit card number to only the last four digits of the account b. Limit display of the credit card number to only the first six digits of the account c Write the card information down when you accept it in case it has to be retransmitted later d. Encrypt cardholder data when transmitting it Question 5 Which of the following is NOT an IT Governance Focus Area of COBIT? a Ensuring that an IT Program is aligned with business goals b Defining proper management of IT infrastructure and resources C. Dictating security controls that must be implemented in your program @d Measuring program effectiveness Question 6 Which organization developed COBIT? a NIST b. ISO C. ISACA Od IEEE Question 7 Which of the following is not a benefit toimnlementina CORIT? Save and Submit Click Save and Submit to save and submit. Click Save All Answers to save all answers. Type here to search F5 F6 La Take Test: Week 3 Lab QX ID Week 3 Due 9/17 1159 G PCI DSS is a law that prex . Secure https://ucumberlands.blackboard.com/webapps/assessment/take/launchu.jsp?course assessment_id=68020_18course_id=_92763_1&content_id-_1095977_1&step Aposlab 1 worksheet : EM W Free splunk training Question Completion Status Question 7 Which of the following is not a benefit to implementing COBIT? a Reduced operational risk b. Ability to offer better IT services c Reduced costs d Clear policy development Question 8 Which of the following is not one of NIST'S six-step RMF processes? a Categonzing security requirements to understand what security controls baseline need to be installed b. Hiring personnel to manage the security program c Selecting security controls to be implemented d Performing an assessment on security controls before authorizing the system or application's use Question 9 When an IT system is ready to be deployed by a Federal agency, it must undergo a security assessment and be authorized Which role can serve as an authorizing official (AO)? a Senior Management b. Security Officer C Security Compliance Auditor ed System Administrator Question 10 Which NIST guidance document provides detailed instructions for performing Information Security Continuous Monitoring? Save and Submit Click Save and Submit to save and submit Click Save All Answers to save all answers. Save All Ans O Type here to search Priser E R. SDF 12 Week 3 Due 9/17 11:59 x Take Test: Week 3 Lab X G PCI DSS is a law that prix с . Secure https://ucumberlands.blackboard.com/webapps/assessment/take/launch.jsp?course assessment id=68020 1&course_id=92763_1&content_id = 10959 ! Appslab 1 worksheet:EM lab 1 worksheet : EMW Free splunk training Question Completion Status Question 8 Which of the following is not one of NIST's six step RMF processes? a Categorizing security requirements to understand what secunity controls baseline need to be installed b Hiring personnel to manage the security program Selecting secunty controls to be implemented d Performing an assessment on security controls before authoring the system or application's use Question 9 When an IT system is ready to be deployed by a Federal agency, it must undergo a security assessment and be authored which tole can serve as an authoring official (AO)? a Senior Management b Security Officer Security Compliance Auditor d. System Administrator Question 10 Which NIST guidance document provides detailed instructions for performing Information Security Continuous Monitoring? a NIST SP 800-53 b NIST SP 800-30 C NIST SP 800.60 d NIST SP 800-137 Save and Submit Click Save and Submit to save and submit. Click Save All Answers to save all answers, Save O Type here to search D e 3 F3 Ed F6 ЕВ FOS F10 F11 Priser & $ 4 % 5 2 3 6 8 O. W E E R T Р А. S s D F. G H К. Z 2 Х С у В М. М. Alt Alt Ctrl
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Question one
True
Question Two
True
Questi...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags