Exam 14: Risk Mitigation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is a collection of suggestions that should be implemented.

(Multiple Choice)
4.9/5
(29)

When designing a security policy, many organizations follow a standard set of ____________________.

(Short Answer)
4.7/5
(29)

A due process policy is a policy that defines the actions users may perform while accessing systems and networking equipment.

(True/False)
5.0/5
(38)

Most people are taught using a(n) ____________________ approach.

(Short Answer)
4.7/5
(38)

Which roles should be represented on the security policy development team?

(Essay)
5.0/5
(38)

List and describe two risk categories.

(Essay)
4.9/5
(39)

List four attributes that should be compiled for new equipment in the change management documentation.

(Essay)
4.7/5
(42)

What are the typical classification designations of government documents?

(Essay)
4.8/5
(33)

A(n) ____ policy outlines how the organization uses personal information it collects.

(Multiple Choice)
4.8/5
(40)

____ networks are typically used for connecting devices on an ad hoc basis for file sharing of audio, video, and data, or real-time data transmission such as telephony traffic.

(Multiple Choice)
4.9/5
(33)

____ are generally considered to be the most important information security policies.

(Multiple Choice)
4.8/5
(34)

Education in an enterprise is limited to the average employee.

(True/False)
4.8/5
(39)

Most organizations follow a three-phase cycle in the development and maintenance of a security policy.

(True/False)
4.8/5
(30)

A(n) ____________________ is a collection of requirements specific to the system or procedure that must be met by everyone.

(Short Answer)
4.8/5
(44)
Match each term with the correct statement below.
Periodic reviewing of a subject's privileges over an object
Threat
Refers to a methodology for making modifications and keeping track of those changes
Privilege
Grouping individuals and organizations into clusters or groups based on some sort of affiliation
Social networking
Correct Answer:
Verified
Premises:
Responses:
Periodic reviewing of a subject's privileges over an object
Threat
Refers to a methodology for making modifications and keeping track of those changes
Privilege
Grouping individuals and organizations into clusters or groups based on some sort of affiliation
Social networking
A subject's access level over an object, such as a user's ability to open a payroll file
Change management
The likelihood that the threat agent will exploit the vulnerability
Vulnerability
A person or element that has the power to carry out a threat
Privilege auditing
A flaw or weakness that allows a threat agent to bypass security
Threat agent
A type of action that has the potential to cause harm
Risk
(Matching)
4.9/5
(42)

A(n) ____ policy is designed to produce a standardized framework for classifying information assets.

(Multiple Choice)
4.9/5
(26)

____ is the planning, coordination, communications, and planning functions that are needed in order to resolve an incident in an efficient manner.

(Multiple Choice)
4.8/5
(26)

At the heart of information security is the concept of ____.

(Multiple Choice)
4.9/5
(28)

What are the duties of the CMT?

(Essay)
4.9/5
(34)

____ learners learn through taking notes, being at the front of the class, and watching presentations.

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)