Exam 2: Planning and Policy
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
In the ________, a specific, full act should require two or more people to complete.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
C
Discounted cash flow analysis is also called ________.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
D
What does a central logging server of an MSSP on a network do?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.
(Multiple Choice)
4.8/5
(26)
A positive of classic risk analysis is that it imposes general discipline for thinking about risks and countermeasures.
(True/False)
4.8/5
(32)
________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.
(Multiple Choice)
4.7/5
(36)
The first stage of FISMA is a certification of a system by an organization.
(True/False)
4.9/5
(39)
Which of the following is NOT one of the three auditing departments that are part of most corporations?
(Multiple Choice)
4.8/5
(40)
Return on investment analysis requires the computation of either the net present value or the ________.
(Multiple Choice)
4.8/5
(38)
The most common type of IT security outsourcing is done for ________.
(Multiple Choice)
4.7/5
(31)
It is common for companies to require users to read and sign a(n) ________.
(Multiple Choice)
4.8/5
(35)
HIPAA has the power to require firms to pay to be audited annually by an external firm.
(True/False)
4.9/5
(31)
Which of the following compares probable losses with the costs of security protections?
(Multiple Choice)
4.9/5
(36)
________ in regard to outside IT security means checking out closely the IT security implications of a potential partnership before beginning the relationship.
(Multiple Choice)
4.8/5
(33)
Objective setting and risk assessment are both COSO framework components.
(True/False)
4.8/5
(37)
COBIT is a general control planning and assessment tool for corporations.
(True/False)
4.7/5
(40)
Showing 1 - 20 of 105
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)