Exam 2: Planning for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Strategic planning has a more short-term focus than tactical planning.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

Which of the following is NOT a significant benefit of information security governance?

Free
(Multiple Choice)
4.7/5
(23)
Correct Answer:
Verified

D

A ____ attack involves sending a large number of connection or information requests to a target.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

B

Which of the following is true about mission statements?

(Multiple Choice)
4.8/5
(34)

An act or event that exploits a vulnerability is known as a(n)____________________.

(Short Answer)
4.8/5
(39)

The first phase of the security systems development life cycle (SecSDLC)is the ____ phase.

(Multiple Choice)
5.0/5
(29)

Boards of directors should supervise strategic information security objectives by verifying that management's investment in information security is properly aligned with organizational strategies and the organization's competitive  \text {\underline{competitive } } environment._________________________

(True/False)
5.0/5
(35)

Top-down information security initiatives must have a(n)____________________ - ideally,an executive with sufficient influence to move the project forward,ensure that it is properly managed,and push for its acceptance throughout the organization.

(Short Answer)
4.8/5
(33)

____ plans are used to organize the ongoing,day-to-day performance of tasks.

(Multiple Choice)
4.8/5
(32)

Tactical planning usually has a focus of ____.

(Multiple Choice)
4.9/5
(36)

The primary goal of internal monitoring is to maintain an informed awareness of the state of all of the organization's networks,information systems,and information security defenses.

(True/False)
4.7/5
(34)

The ____________________ statement contains a formal set of organizational principles,standards,and qualities.

(Short Answer)
4.7/5
(36)

The application of computing and network resources to try every possible combination of characters to crack a password is known as a ____ attack.

(Multiple Choice)
4.8/5
(34)

 Strategic \text {\underline{ Strategic} } plans are used to create tactical plans._________________________

(True/False)
4.9/5
(46)

According to the Corporate Governance Task Force (CGTF),during which phase in the IDEAL model and framework does the organization plan the specifics of who it will reach its destination?

(Multiple Choice)
4.9/5
(33)

____ controls deal with managerial functions and lower-level planning such as disaster recovery and incident response planning.

(Multiple Choice)
4.8/5
(35)

CISOs use the operational plan to organize,prioritize,and acquire resources for major projects.

(True/False)
4.8/5
(38)

A technique or mechanism that is used to compromise a system is called a(n)____________________.

(Short Answer)
4.7/5
(34)

Because it sets out general business intentions,a mission statement does not need to be concise.

(True/False)
4.9/5
(29)

Boards of directors should supervise strategic information security objectives by demanding ____________________ from the various layers of management on the information security program's effectiveness and adequacy

(Short Answer)
4.7/5
(30)
Showing 1 - 20 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)