Exam 2: Planning for Security
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Strategic planning has a more short-term focus than tactical planning.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
Which of the following is NOT a significant benefit of information security governance?
Free
(Multiple Choice)
4.7/5
(23)
Correct Answer:
D
A ____ attack involves sending a large number of connection or information requests to a target.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
B
An act or event that exploits a vulnerability is known as a(n)____________________.
(Short Answer)
4.8/5
(39)
The first phase of the security systems development life cycle (SecSDLC)is the ____ phase.
(Multiple Choice)
5.0/5
(29)
Boards of directors should supervise strategic information security objectives by verifying that management's investment in information security is properly aligned with organizational strategies and the organization's
environment._________________________
(True/False)
5.0/5
(35)
Top-down information security initiatives must have a(n)____________________ - ideally,an executive with sufficient influence to move the project forward,ensure that it is properly managed,and push for its acceptance throughout the organization.
(Short Answer)
4.8/5
(33)
____ plans are used to organize the ongoing,day-to-day performance of tasks.
(Multiple Choice)
4.8/5
(32)
The primary goal of internal monitoring is to maintain an informed awareness of the state of all of the organization's networks,information systems,and information security defenses.
(True/False)
4.7/5
(34)
The ____________________ statement contains a formal set of organizational principles,standards,and qualities.
(Short Answer)
4.7/5
(36)
The application of computing and network resources to try every possible combination of characters to crack a password is known as a ____ attack.
(Multiple Choice)
4.8/5
(34)
plans are used to create tactical plans._________________________
(True/False)
4.9/5
(46)
According to the Corporate Governance Task Force (CGTF),during which phase in the IDEAL model and framework does the organization plan the specifics of who it will reach its destination?
(Multiple Choice)
4.9/5
(33)
____ controls deal with managerial functions and lower-level planning such as disaster recovery and incident response planning.
(Multiple Choice)
4.8/5
(35)
CISOs use the operational plan to organize,prioritize,and acquire resources for major projects.
(True/False)
4.8/5
(38)
A technique or mechanism that is used to compromise a system is called a(n)____________________.
(Short Answer)
4.7/5
(34)
Because it sets out general business intentions,a mission statement does not need to be concise.
(True/False)
4.9/5
(29)
Boards of directors should supervise strategic information security objectives by demanding ____________________ from the various layers of management on the information security program's effectiveness and adequacy
(Short Answer)
4.7/5
(30)
Showing 1 - 20 of 123
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)