1.
(TCO 6) An employee who fails to report a suspected security weakness
(Points : 4)



Question 2.
2.
(TCO 7) Which of the following is NOT an access control method?
(Points : 4)





Question 3.
3.
(TCO 8) When is the best time to think about security when writing a new piece of code?
(Points : 4)





Question 4.
4.
(TCO 9) As it pertains to GLBA, what does NPI stand for?
(Points : 4)





Question 5.
5.
(TCO 6) The primary antimalware control is
(Points : 4)





Question 6.
6.
(TCO 7) Which is the first target of a hacker who has gained access to an organization’s network?
(Points : 4)





Question 7.
7.
(TCO 8) Which formal security-related process should take place at the beginning of the code creation project?
(Points : 4)





Question 8.
8.
(TCO 9) Who enforces the GLBA?
(Points : 4)





Question 9.
9.
(TCO 6) The part of the antivirus solution that needs to be updated daily is
(Points : 4)





Question 10.
10.
(TCO 7) All users are expected to keep their password secret, unless
(Points : 4)




Question 11.
11.
(TCO 8) If
an employee uses a company-provided application system and finds what he
or she thinks is a loophole that allows access to confidential data,
that employee should

(Points : 4)





Question 12.
12.
(TCO 9) What do the Interagency Guidelines require every covered institution to implement?
(Points : 4)





Question 13.
13.
(TCO 6) Grandfather-father-son is a model used for
(Points : 4)





Question 14.
14.
(TCO 7) Which of the following is the most popular single factor authentication method?
(Points : 4)





Question 15.
15.
(TCO 8) Input validation is
(Points : 4)