Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?

QuestionQuestion 1 (5 points)The macro virus infects the key operating system files located in a computer’s start up sector.Question 1 options:TrueFalseSaveQuestion 2 (5 points)Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?Question 2 options:ProjectsPolicyProtectionPeopleSaveQuestion 3 (5 points)Which of the following is NOT a primary function of Information Security Management?Question 3 options:ProjectsPerformancePlanningProtectionSaveQuestion 4 (5 points)According to the C.I.A. triad, which of the following is a desirable characteristic for computer security?Question 4 options:AuthenticationAuthorizationAvailabilityAccountabilitySaveQuestion 5 (5 points)Which of the following is NOT a step in the problem-solving process?Question 5 options:Gather facts and make assumptionsSelect, implement and evaluate a solutionAnalyze and compare possible solutionsBuild support among management for the candidate solutionSaveQuestion 6 (5 points)A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.Question 6 options:TrueFalseSaveQuestion 7 (5 points)”Shoulder spying” is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance.Question 7 options:TrueFalseSaveQuestion 8 (5 points)As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________.Question 8 options:hoaxespolymorphismsfalse alarmsurban legendsSaveQuestion 9 (5 points)The first step in solving problems is to gather facts and make assumptions.Question 9 options:TrueFalseSaveQuestion 10 (5 points)Blackmail threat of informational disclosure is an example of which threat category?Question 10 options:Compromises of intellectual propertyEspionage or trespassInformation extortionSabotage or vandalismSaveQuestion 11 (5 points)Which of the following is the best example of a rapid-onset disaster?Question 11 options:FamineEnvironmental degradationFloodPest infestationSaveQuestion 12 (5 points)Which type of document grants formal permission for an investigation to occur?Question 12 options:Forensic concurrenceAffidavitEvidentiary reportSearch warrantSaveQuestion 13 (5 points)In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?Question 13 options:Structured walk-throughDesk checkParallel testingSimulationSaveQuestion 14 (5 points)ISO 27014:2013 is the ISO 27000 series standard for __________.Question 14 options:information security managementpolicy managementgovernance of information securityrisk managementSaveQuestion 15 (5 points)Which document must be changed when evidence changes hands or is stored?Question 15 options:AffidavitSearch warrantEvidentiary materialChain of custodySaveQuestion 16 (5 points)Which of the following allows investigators to determine what happened by examining the results of an event—criminal, natural, intentional, or accidental?Question 16 options:ForensicsE-discoveryDigital malfeasanceEvidentiary proceduresSaveQuestion 17 (5 points)Individuals who control, and are therefore responsible for, the security and use of a particular set of information are known as __________.Question 17 options:data usersdata generatorsdata ownersdata custodiansSaveQuestion 18 (5 points)What is the final stage of the business impact analysis when using the NIST SP 800-34 approach?Question 18 options:Identify resource requirementsIdentify recovery priorities for system resourcesDetermine mission/business processes and recovery criticalityIdentify business processesSaveQuestion 19 (5 points)Which level of planning breaks down each applicable strategic goal into a series of incremental objectives?Question 19 options:OperationalStrategicOrganizationalTacticalSaveQuestion 20 (5 points)Which of the following has the main goal of restoring normal modes of operation with minimal cost and disruption to normal business activities after an adverse event?Question 20 options:Risk managementContingency planningDisaster readinessModule 3Business responseQuestion 21 (5 points)Which of the following are instructional codes that guide the execution of the system when informationQuestion 21 options:configuration rulesuser profilesaccess control listscapability tablesSaveQuestion 22 (5 points)A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC?Question 22 options:AnalysisImplementationDesignInvestigationSaveQuestion 23 (5 points)In addition to specifying the penalties for unacceptable behavior, what else must a policy specify?Question 23 options:The proper operation of equipmentWhat must be done to complyLegal recourseAppeals processSaveQuestion 24 (5 points)Which of the following is NOT a step in the process of implementing training?Question 24 options:Motivate management and employeesAdminister the programIdentify target audiencesHire expert consultantsSaveQuestion 25 (5 points)Which of the following is an element of the enterprise information security policy?Question 25 options:Information on the structure of the InfoSec organizationAccess control listsArticulation of the organization’s SDLC methodologyIndemnification of the organization against liabilitySaveQuestion 26 (5 points)Which of the following is the most cost-effective method for disseminating security information and news to employees?Question 26 options:Security-themed Web siteDistance learning seminarsConference callsSecurity newsletterSaveQuestion 27 (5 points)Which of the following is NOT among the three types of InfoSec policies based on NIST’s Special Publication 800-14?Question 27 options:Enterprise information security policyUser-specific security policiesSystem-specific security policiesIssue-specific security policiesSaveQuestion 28 (5 points)Which of the following would be responsible for configuring firewalls and IDPSs, implementing security software, and diagnosing and troubleshooting problems?Question 28 options:A security analystThe security managerA security technicianA security consultantSaveQuestion 29 (5 points)Which policy is the highest level of policy and is usually created first?Question 29 options:USSPISSPEISPSysSPSaveQuestion 30 (5 points)Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation?Question 30 options:Centralized authenticationPolicyRisk managementCompliance/auditSavePrevious PageNext PageQuestion 31 (5 points)Which of the following is the primary purpose of ISO/IEC 27001:2005?Question 31 options:Use within an organization to ensure compliance with laws and regulationsUse within an organization to formulate security requirements and objectivesImplementation of business-enabling information securityTo enable organizations that adopt it to obtain certificationSaveQuestion 32 (5 points)Which security architecture model is part of a larger series of standards collectively referred to as the “Rainbow Series”?Question 32 options:Bell-LaPadulaITSECTCSECCommon CriteriaSaveQuestion 33 (5 points)Under the Common Criteria, which term describes the user-generated specifications for security requirements?Question 33 options:Security Functional Requirements (SFRs)Security Target (ST)Protection Profile (PP)Target of Evaluation (ToE)SaveQuestion 34 (5 points)Which type of access controls can be role-based or task-based?Question 34 options:NondiscretionaryConstrainedDiscretionaryContent-dependentSaveQuestion 35 (5 points)Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?Question 35 options:Need-to-knowSeparation of dutiesEyes onlyLeast privilegeSaveQuestion 36 (5 points)The InfoSec measurement development process recommended by NIST is is divided into two major activities. Which of the following is one of them?Question 36 options:Identification and definition of the current InfoSec programRegularly monitor and test networksCompare organizational practices against organizations of similar characteristicsMaintain a vulnerability management programSaveQuestion 37 (5 points)Which piece of the Trusted Computing Base’s security system manages access controls?Question 37 options:Trusted computing baseVerification moduleCovert channelReference monitorSaveQuestion 38 (5 points)Which of the following is a possible result of failure to establish and maintain standards of due care and due diligence?Question 38 options:Legal liabilityBaseliningCertification revocationCompetitive disadvantageSaveQuestion 39 (5 points)Which access control principle limits a user’s access to the specific information required to perform the currently assigned task?Question 39 options:Need-to-knowEyes onlyLeast privilegeSeparation of dutiesSaveQuestion 40 (5 points)Which of the following specifies the authorization classification of information asset an individual user is permitted to access, subject to the need-to-know principle?Question 40 options:Task-based access controlsDiscretionary access controlsSensitivity levelsSecurity clearancesSave

Evaluate how successful the author was in convincing you to accept the validity of the “surprise ending” that was different from what you expected. 

URGENT NEED A HUMANITY ESSAY DONE! MUST BE ORIGINAL. WILL BE CHECKED IN TURNITIN

Please see instructions below.

Three to four (3-4) paragraph essay (250 words minimum) which analyzes the “surprise ending” of the reading selection

  • Two (2) reading selections from Voltaire’s Candide. Consider how these readings start and end in terms of the action and the beliefs. You are looking for surprise and a point of realization. These selections can be found on pp. 840-841 in the textbook. In addition, consult the class text at pp. 824-825.
  • Textbook: SAYRE, H.M (2015) THE HUMANITIES:CULTURE, CONTINUITY AND CHANGR VOLUME 2 (3RD EDITION)
  1. Clearly state in your own words the “surprise ending” in the reading you selected. Clearly identify the point in the reading when you realized that there were elements in the reading that surprised you. Not all of the surprises come at the end.

The specific course learning outcomes associated with this assignment are:

  • Explain how key social, cultural, and artistic contributions contribute to historical changes.
  • Explain the importance of situating a society’s cultural and artistic expressions within a historical context.
  • Examine the influences of intellectual, religious, political, and socio-economic forces on social, cultural, and artistic expressions.
  • Identify major historical developments in world cultures from the Renaissance to the contemporary period.
  • Use technology and information resources to research issues in the study of world cultures.
  • Write clearly and concisely about world cultures using proper writing mechanics.
  1. Evaluate how successful the author was in convincing you to accept the validity of the “surprise ending” that was different from what you expected.

What political risk is occurring when a government decides to take over a business without paying for it?

An American business wants to enter a foreign market, but it is concerned with how political issues may affect the

business. Which of the following is most likely to be at the top of the list it should be concerned with?

Multiple Choice

  • the existence of voluntary export restrictions
  • the practice of acculturation
  • the presence of nongovernmental organizations
  • the existence of cyberterrorism
  • the instability of prevailing government policies

When a Chinese company tried to purchase Unocal, it was perceived by some in the U.S. as

Multiple Choice

  • a threat to sovereignty.
  • an avenue for illegal immigration.
  • a drain on the economy.
  • a potential devaluing of the dollar.
  • a sign that the Chinese economy was stronger than the U.S. economy.

Changes in governments or ruling political parties can affect businesses. The main concern of a multinational corporation is

Multiple Choice

  • change in the economic risk.
  • access to open markets.
  • the continuity of the set of rules, codes of behaviors, and the rule of law.
  • which government is in power.
  • the exchange rate and trade policies.

A country is ruled by one woman alone. This country’s form of government is most likely a(n)

Multiple Choice

  • oligarchy.
  • monopoly.
  • democracy.
  • dictatorship.
  • aristocracy.

Economic nationalism has what effect on international relations?

Multiple Choice

  • It causes countries to be more economically interdependent, which affects trade policies.
  • It makes national security and interest more important than international relations.
  • Nationalist feelings lead to loss of control over foreign investment.
  • Economic nationalism does not affect international relations.
  • It invites foreign investment as a means of shoring up the national economy.

What political risk is occurring when a government decides to take over a business without paying for it?

Multiple Choice

  • nationalization
  • expropriation
  • restriction
  • confiscation
  • privatization

Expropriation may result in

Multiple Choice

  • assets being seized by the International Trade Administration.
  • a more gradual change than domestication.
  • assets becoming a government-run entity.
  • assets being insured by the Overseas Private Investment Corporation.
  • seizing a company’s assets without payment.

Confiscation, expropriation, and domestication are classified as ________ risks.

Multiple Choice

  • political
  • social
  • market
  • environmental
  • pricing

Countries, such as South Korea and Singapore, now view foreign investment as

Multiple Choice

  • a political risk to the country receiving the investment.
  • a path to economic growth.
  • a way to learn new technologies to make local companies more successful.
  • an environmental danger.
  • a drag on pricing in the industries that receive the investment.

Exchange controls are most likely imposed by a country

Multiple Choice

  • when there is a substantial amount of capital leaving the country.
  • when it is required that a portion of any product sold within the country contain locally made parts.
  • when there are no adequately developed sources of supply within the country.
  • when there is a drop in the price of essential products that command considerable public interest in the country.
  • when there is an abundance of foreign exchange in the country.

To control the cost of living in a country during inflationary periods, what may be applied to essential products that command considerable public interest?

Multiple Choice

  • price controls
  • exchange controls
  • antidumping duties
  • import restrictions
  • local-content laws

After Russia’s interference in the U.S. election, Congress issued ________ against the country.

Multiple Choice

  • trade sanctions
  • an injunction
  • a freeze on bank accounts
  • an expulsion of Russian citizens
  • a travel ban

The Export-Import Bank provides

Multiple Choice

  • aid to underdeveloped countries and has limited protection in support of “essential” projects in approved countries and for approved products.
  • credit insurance that minimizes nonpayment risk caused by financial, economic, or political uncertainties.
  • a means to helping U.S. business compete in the global marketplace.
  • underwriting of trade and investments for U.S. firms.
  • risk insurance for companies investing in less-developed countries.

The International Trade Administration provides

Multiple Choice

  • aid to underdeveloped countries and has limited protection in support of “essential” projects in approved countries and for approved products.
  • credit insurance that minimizes nonpayment risk caused by financial, economic, or political uncertainties.
  • a means to helping U.S. business compete in the global marketplace.
  • underwriting of trade and investments for U.S. firms.
  • risk insurance for companies investing in less-developed countries.

The International Trade Administration provides

Multiple Choice

  • aid to underdeveloped countries and has limited protection in support of “essential” projects in approved countries and for approved products.
  • credit insurance that minimizes nonpayment risk caused by financial, economic, or political uncertainties.
  • a means to helping U.S. business compete in the global marketplace.
  • underwriting of trade and investments for U.S. firms.
  • risk insurance for companies investing in less-developed countries.

The International Trade Administration provides

Create a 12- to 14-slide presentation (not counting the title and reference slides) that includes specific information as outlined below.

Imagine that you have been tasked with creating a training and development program for midlevel business managers in an organization (you can use your actual organization or one that you create). A midlevel manager is defined as a manager of managers. You have to present your proposed training program to your supervisor. To do this, you must decide on a training model, conduct a needs analysis, write learning objectives, and create the content of the training.

Create a 12- to 14-slide presentation (not counting the title and reference slides) that includes specific information as outlined below.

The topic of the training can be any subject relevant to a midlevel manager that we covered in the course, such as how to deliver real-time coaching feedback, how to communicate unfavorable news to employees (e.g., compensation status changes), or how to communicate that a complaint has been made against an employee concerning harassment.

If you are unsure that your topic is appropriate, contact your professor for approval.

Be sure to include the information below in your PowerPoint presentation.

Discuss your selected training process model, and describe why you recommend this model.

Explain the steps you would have taken to conduct a needs analysis.

State how this training links to the organizational objectives.

Provide a sample of two measurable course objectives (from input objectives through impact objectives).

Present one of the program’s completed modules. For example, this should be one or two of the objectives that inform or engage the participants in an activity.

Be sure to cite any sources used in a reference slide with proper APA style. In addition, a minimum of one academic source that was not used in the Unit III Lesson or listed in required reading must be used, cited, and referenced.

Use the slide notes function to explain slide contents as necessary.