Exam 1: Contingency Planning Within Information Security
Exam 1: Contingency Planning Within Information Security50 Questions
Exam 2: Planning for Organizational Readiness50 Questions
Exam 3: Incidence Response: Preparation, Organization, and Prevention50 Questions
Exam 4: Incident Response: Detection and Decision Making49 Questions
Exam 5: Incidence Response: Reaction, Recovery, and Maintenance50 Questions
Exam 6: Contingency Strategies for Business Resumption Planning50 Questions
Exam 7: Disaster Recovery: Preparation and Implementation50 Questions
Exam 8: Disaster Recovery: Operation and Maintenance50 Questions
Exam 9: Business Continuity Preparation and Implementation50 Questions
Exam 10: Business Continuity Operations and Maintenance50 Questions
Exam 11: Crisis Management and Human Factors50 Questions
Select questions type
What are the steps in contingency planning?
Free
(Essay)
4.7/5
(29)
Correct Answer:
1.The IR plan focuses on immediate response,but if the attack escalates or is disastrous (such as a fire,flood,earthquake,or total blackout)the process moves on to disaster recovery and business continuity.
2.The DR plan typically focuses on restoring systems at the original site after disasters occur,and as such is closely associated with the BC plan.
3.The BC plan runs concurrently with DRP when the damage is major or long term,requiring more than simple restoration of information and information resources.The BC plan establishes critical business functions at an alternate site.
____ is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas".
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
The threat of corruption can occur while information is being stored or transmitted.____ is the prevention of that corruption.
Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
C
A(n)____ is prepared by the organization to anticipate,react to,and recover from events that threaten the security of information and information assets in the organization,and,subsequently,to restore the organization to normal modes of business operations.
(Multiple Choice)
4.9/5
(28)
An asset can be logical,such as a Web site,information,or data;or an asset can be physical,such as a person,computer system,or other tangible object.
(True/False)
4.8/5
(37)
Match each statement with an item below.
-The risk that remains to the information asset even after the existing control has been applied.
(Multiple Choice)
5.0/5
(30)
The ____ has been the industry standard for computer security since the development of the mainframe.
(Multiple Choice)
4.7/5
(30)
A(n)____ is a category of objects,persons,or other entities that pose a potential risk of loss to an asset.
(Multiple Choice)
4.9/5
(38)
Match each statement with an item below.
-The process used to identify and then control risks to an organization's information assets.
(Multiple Choice)
4.9/5
(44)
What is difference between access control lists and configuration rules?
(Essay)
4.7/5
(36)
____ enables authorized users - persons or computer systems - to access information without interference or obstruction,and to receive it in the required format.
(Multiple Choice)
4.9/5
(37)
Match each statement with an item below.
-Detailed statements of what must be done to comply with policy.
(Multiple Choice)
4.7/5
(41)
For the purpose of relative risk assessment,____________________ equals likelihood of vulnerability occurrence times value (or impact)minus percentage risk already controlled plus an element of uncertainty.
(Short Answer)
4.8/5
(30)
A(n)____ is a plan or course of action used by an organization to convey instructions from its senior-most management to those who make decisions,take actions,and perform other duties on behalf of the organization.
(Multiple Choice)
4.8/5
(40)
What are some of the criteria to be considered when conducting an information asset valuation?
(Essay)
4.7/5
(33)
Match each statement with an item below.
-The probability that a specific vulnerability within an organization will be successfully attacked.
(Multiple Choice)
4.8/5
(28)
____ of risk is the choice to do nothing to protect a vulnerability,and to accept the outcome of its exploitation.
(Multiple Choice)
4.7/5
(27)
Match each statement with an item below.
-A specific and identifiable instance of a general threat.
(Multiple Choice)
4.7/5
(29)
____________________ is the process of identifying vulnerabilities in an organization's information systems and taking carefully reasoned steps to ensure the confidentiality,integrity,and availability of all the components in the organization's information system.
(Essay)
4.9/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)