Exam 7: Security Management Practices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Benchmarking can help to determine ____ controls should be considered,but it cannot determine ____ those controls should be implemented in your organization.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

D

In information security,two categories of benchmarks are used: standards of due care and due diligence and ____ practices.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

A ____ is a "value or profile of a performance metric against which changes in the performance metric can be usefully compared.".

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

Maintaining an acceptable level of secure controls over time indicates that an organization has met the standard of ____.

(Multiple Choice)
4.9/5
(37)

Once developed,information security performance measures must be implemented and integrated into ____ information security management operations.

(Multiple Choice)
4.7/5
(31)

The first phase in the NIST performance measures methodology is to collect data and analyze results; collect,aggregate,and consolidate metric data collection and compare measurements with targets.

(True/False)
4.9/5
(34)

Which of the following is the last phase in the NIST process for performance measures implementation?

(Multiple Choice)
4.8/5
(27)

Information security ____ is the process of designing,implementing,and managing the use of the collected data elements called measures to determine the effectiveness of the overall security program.

(Multiple Choice)
4.8/5
(31)

Problems with benchmarking include all but which of the following?

(Multiple Choice)
4.9/5
(37)

The second step in the NIST SP 800-37 model for security certification and accreditation is to select the appropriate minimum security ____________________ for the system.

(Short Answer)
4.8/5
(43)

One of the three goals of System Certification and Accreditation as defined by NIST is to: define essential maximum security controls for federal IT systems.

(True/False)
4.9/5
(29)

In the NIST performance measures implementation process,the comparison of observed measurements with target values is known as a ____ analysis.

(Multiple Choice)
4.8/5
(33)

In reporting InfoSec performance measures,the CISO must also consider ____.

(Multiple Choice)
4.7/5
(33)

Security Certification & Accreditation initiative offers several benefits.Which of the following is NOT one of them?

(Multiple Choice)
4.8/5
(32)

When an organization applies statistical and quantitative forms of mathematical analysis to the data points collected to measure the activities and outcomes of the InfoSec program,it is using InfoSec best practices.

(True/False)
4.9/5
(29)

Designing the performance measures collection process requires thoughtful consideration of the ____ of the metric along with a thorough knowledge of how production services are delivered.

(Multiple Choice)
4.9/5
(31)

One of the priorities in building an information security measures program is determining whether these measures will be macro-focus or micro-focus.____ measures examine the performance of the overall security program.

(Multiple Choice)
4.9/5
(44)

Security efforts that seek to provide a superior level of performance in the protection of information are called ____.

(Multiple Choice)
4.8/5
(39)

One of the critical tasks in the measurement process is to assess and quantify what will be secured._________________________

(True/False)
4.7/5
(40)

In information security,two categories of benchmarks are used: standards of due care and due diligence and recommended practices._________________________

(True/False)
4.9/5
(38)
Showing 1 - 20 of 114
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)