Exam 2: Planning and Policy

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

In the ________, a specific, full act should require two or more people to complete.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

C

Discounted cash flow analysis is also called ________.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

What does a central logging server of an MSSP on a network do?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.

(Multiple Choice)
4.8/5
(26)

A positive of classic risk analysis is that it imposes general discipline for thinking about risks and countermeasures.

(True/False)
4.8/5
(32)

________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.

(Multiple Choice)
4.7/5
(36)

The first stage of FISMA is a certification of a system by an organization.

(True/False)
4.9/5
(39)

Which of the following is NOT one of the three auditing departments that are part of most corporations?

(Multiple Choice)
4.8/5
(40)

Return on investment analysis requires the computation of either the net present value or the ________.

(Multiple Choice)
4.8/5
(38)

Why was FISMA enacted?

(Multiple Choice)
5.0/5
(30)

The most common type of IT security outsourcing is done for ________.

(Multiple Choice)
4.7/5
(31)

Most firms have a CSO report direct to the company's CEO.

(True/False)
4.8/5
(32)

A firm's primary objective is to make a profit.

(True/False)
4.8/5
(27)

It is common for companies to require users to read and sign a(n) ________.

(Multiple Choice)
4.8/5
(35)

HIPAA has the power to require firms to pay to be audited annually by an external firm.

(True/False)
4.9/5
(31)

An advantage to using an MSSP is ________.

(Multiple Choice)
4.8/5
(37)

Which of the following compares probable losses with the costs of security protections?

(Multiple Choice)
4.9/5
(36)

________ in regard to outside IT security means checking out closely the IT security implications of a potential partnership before beginning the relationship.

(Multiple Choice)
4.8/5
(33)

Objective setting and risk assessment are both COSO framework components.

(True/False)
4.8/5
(37)

COBIT is a general control planning and assessment tool for corporations.

(True/False)
4.7/5
(40)
Showing 1 - 20 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)