Often an extension of a memorandum of understanding (MOU), the blanket purchase
ID: 3882127 • Letter: O
Question
Often an extension of a memorandum of understanding (MOU), the blanket purchase agreement (BPA) serves as an agreement that documents the technical requirements of interconnected assets.
True
False
Social engineering is deceiving or using people to get around security controls.
True
False
Company-related classifications are not standard, therefore, there may be some differences between the terms "private" and "confidential" in different companies.
True
False
Which practice is NOT considered unethical under RFC 1087 issued by the Internet Architecture Board (IAB)?
Seeking to gain unauthorized access to resources
Disrupting intended use of the Internet
Enforcing the integrity of computer-based information
Compromising the privacy of users
Standards are used when an organization has selected a solution to fulfill a policy goal.
True
False
A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing.
True
False
A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
True
False
Procedures do NOT reduce mistakes in a crisis.
True
False
One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
True
False
Roger's organization received a mass email message that attempted to trick users into revealing their passwords by pretending to be a help desk representative. What category of social engineering is this an example of?
Intimidation
Name dropping
Appeal for help
Phishing
Mandatory vacations minimize risk by rotating employees among various systems or duties.
True
False
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
Service level agreement (SLA)
Blanket purchase agreement (BPA)
Memorandum of understanding (MOU)
Interconnection security agreement (ISA)
Seeking to gain unauthorized access to resources
Disrupting intended use of the Internet
Enforcing the integrity of computer-based information
Compromising the privacy of users
Explanation / Answer
1)Answer: false
Explanation:
Interconnection security agreement (extension of MOU; it serves as an agreement that documents the technical requirements pf interconnected assets. It is most often used to specify technical needs and security responsibilities of connected organizations.
2)Answer: True
Explanation:
Social engineering is deceiving or using people to get around security controls.
5)Answer: True
Explanation:
Standards are used when an organization has selected a solution to fulfill a policy goal.
7)Answer: True
Explanation:
A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing.
8)Answer: False
Explanation:
compliance liaison. makes sure all personnel are aware of and comply with theorganization's policies.
9)Answer: True
Explanation:
One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
10)Answer: False
Explanation:
Job rotation minimizes risk by rotating employees among various systems or duties
11)Answer:
Memorandum of understanding (MOU)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.