Professional Documents
Culture Documents
Page 1 of 3
Submitted by Cotto,William on 11/21/2013 8:14:52 PM Points Awarded 0.00 Points Missed Percentage 0.00 0%
1. The relative value of an information asset depends on how much ____ it generatesor, in the case of a nonprofit organization, how critical it is to service delivery. A) risk B) margin C) revenue D) data Points Earned: 0.0/0.0 Correct Answer(s): C
3. The ____ community best understands threats and attacks that put an organization at risk. A) information technology B) information security C) general management D) users Points Earned: 0.0/0.0 Correct Answer(s): B
4. Almost every organization is aware of its image in the local, national, and international spheres. Loss or ____ of some assets would prove especially embarrassing. A) theft B) deletion C) exposure D) destruction
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 11/26/2013
PD
Fi
ll P
DF
Ed
ito
rw
ith
2. The ____ is also referred to as an electronic serial number. A) asset ID B) MAC address C) IP address D) model number
Fr ee
rit
er an d
To
ols
Test 7 - Practice
Page 2 of 3
Points Earned:
0.0/0.0
Correct Answer(s): C
5. People are divided into insiders (employees) and outsiders (nonemployees). Outsiders come in two categories: either they hold trusted roles and have correspondingly greater authority and accountability, or they are regular staff without any special privileges. A) True B) False Points Earned: 0.0/0.0 Correct Answer(s): False
7. Which of the following distinctly identifies an asset and can be vital in later analysis of threats directed to specific models of certain devices or software components? A) Name B) MAC address C) Serial number D) Manufacturers part number Points Earned: 0.0/0.0 Correct Answer(s): D
8. To make the process of analyzing threats less daunting, steps in the threat and vulnerability identification processes should be handled jointly. A) True B) False Points Earned: 0.0/0.0 Correct Answer(s): False
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 11/26/2013
PD
Fi
ll P
DF
Ed
ito
rw
ith
Fr ee
6. Which of the following describes an attribute that displays where an asset can be found on an organizations network? A) Serial number B) Logical location C) Controlling entity D) Physical location
rit
er an d
To
ols
Test 7 - Practice
Page 3 of 3
9. The ____ is an attribute that can be helpful in analyzing threat outbreaks when certain manufacturers announce specific vulnerabilities. A) serial number B) model number C) manufacturer name D) software version Points Earned: 0.0/0.0 Correct Answer(s): C
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx... 11/26/2013
PD
Fi
ll P
DF
Ed
ito
rw
Continue
ith
Fr ee
rit
er an d
10. A(n) comprehensive classification of information assets means that all inventoried assets fit into a category. A) True B) False
To
ols