Exam 9: Security Management Practices
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
A legal standard that requires an organization and its employees to actas a reasonable and prudent individual or organization would under similar circumstances.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
H
Which of the following is NOT a question to be used as a self-assessment for recommended security practices in the category of people?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
Which of the following is NOT a consideration when selecting recommended best practices?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
D
A comprehensive assessment of a system's technical and nontechnical protectionstrategies,as specified by a particular set of requirements.
(Multiple Choice)
4.8/5
(45)
One question you should ask when choosing among recommended practices is "Can your organization afford to implement the recommended practice?"
(True/False)
4.8/5
(25)
The authorization of an IT system to process,store,or transmit information.
(Multiple Choice)
4.9/5
(47)
A common approach to a Risk ManagementFramework (RMF)for InfoSec practice.
(Multiple Choice)
5.0/5
(45)
An assessment of the performance of some action or process against which futureperformance is assessed.
(Multiple Choice)
4.9/5
(29)
The actions that demonstrate that an organization has made a valid effort to protect othersa requirement and that the implementedstandards continue to provide the required level of protection.
(Multiple Choice)
4.9/5
(35)
The process of implementing a performance measures program recommended by NIST involves six phases.List and describe them.
(Essay)
4.8/5
(35)
Data or the trends in data that may indicate the effectiveness ofsecurity countermeasures or controls-technical and managerial-implemented in theorganization are known as program measurements.____________
(True/False)
4.8/5
(33)
Which of the following is NOT a factor critical to the success of an information security performance program?
(Multiple Choice)
4.9/5
(42)
Why it measurement prioritization and selection important?How can it be achieved?
(Essay)
4.8/5
(38)
A practice related to benchmarking is ____________,which is a measurement against a prior assessment or an internal goal.
(Short Answer)
4.8/5
(33)
Which of the following is the last phase in the NIST process for performance measures implementation?
(Multiple Choice)
5.0/5
(41)
According to NIST SP 800-37,which of the following is the first step in the security controls selection process?
(Multiple Choice)
4.7/5
(30)
The data or the trends in data that may indicate the effectiveness ofsecurity countermeasures or controls-technical and managerial-implemented in theorganization.
(Multiple Choice)
4.8/5
(34)
Which of the following is NOT one of the three types of performance measures used by organizations?
(Multiple Choice)
4.8/5
(30)
InfoSec measurements collected from production statistics depend greatly on which of the following factors?
(Multiple Choice)
4.8/5
(40)
Organizations must consider all but which of the following during development and implementation of an InfoSec measurement program?
(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)