You are on page 1of 3

Test 7 - Practice

Page 1 of 3

Submitted by Cotto,William on 11/21/2013 8:14:52 PM Points Awarded 0.00 Points Missed Percentage 0.00 0%

1. The relative value of an information asset depends on how much ____ it generatesor, in the case of a nonprofit organization, how critical it is to service delivery. A) risk B) margin C) revenue D) data Points Earned: 0.0/0.0 Correct Answer(s): C

3. The ____ community best understands threats and attacks that put an organization at risk. A) information technology B) information security C) general management D) users Points Earned: 0.0/0.0 Correct Answer(s): B

4. Almost every organization is aware of its image in the local, national, and international spheres. Loss or ____ of some assets would prove especially embarrassing. A) theft B) deletion C) exposure D) destruction

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 11/26/2013

PD

Fi

ll P

DF

Ed

ito

Points Earned: 0.0/0.0 Correct Answer(s): B

rw

ith

2. The ____ is also referred to as an electronic serial number. A) asset ID B) MAC address C) IP address D) model number

Fr ee

rit

er an d

To

ols

Test 7 - Practice

Page 2 of 3

Points Earned:

0.0/0.0

Correct Answer(s): C

5. People are divided into insiders (employees) and outsiders (nonemployees). Outsiders come in two categories: either they hold trusted roles and have correspondingly greater authority and accountability, or they are regular staff without any special privileges. A) True B) False Points Earned: 0.0/0.0 Correct Answer(s): False

7. Which of the following distinctly identifies an asset and can be vital in later analysis of threats directed to specific models of certain devices or software components? A) Name B) MAC address C) Serial number D) Manufacturers part number Points Earned: 0.0/0.0 Correct Answer(s): D

8. To make the process of analyzing threats less daunting, steps in the threat and vulnerability identification processes should be handled jointly. A) True B) False Points Earned: 0.0/0.0 Correct Answer(s): False

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 11/26/2013

PD

Fi

ll P

DF

Ed

ito

rw

Points Earned: 0.0/0.0 Correct Answer(s): B

ith

Fr ee

6. Which of the following describes an attribute that displays where an asset can be found on an organizations network? A) Serial number B) Logical location C) Controlling entity D) Physical location

rit

er an d

To

ols

Test 7 - Practice

Page 3 of 3

9. The ____ is an attribute that can be helpful in analyzing threat outbreaks when certain manufacturers announce specific vulnerabilities. A) serial number B) model number C) manufacturer name D) software version Points Earned: 0.0/0.0 Correct Answer(s): C

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 11/26/2013

PD

Fi

ll P

DF

Ed

ito

rw

Continue

ith

Fr ee

Points Earned: 0.0/0.0 Correct Answer(s): True

rit

er an d

10. A(n) comprehensive classification of information assets means that all inventoried assets fit into a category. A) True B) False

To

ols

You might also like