Exam 1: Introduction to the Management of Information Security
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
____________________ is unsolicited commercial e-mail.
Free
(Short Answer)
5.0/5
(50)
Correct Answer:
Spam
Explain the differences between a leader and a manager.
Free
(Essay)
4.9/5
(34)
Correct Answer:
The distinctions between a leader and a manager arise in the execution of organizational tasks.A leader provides purpose,direction,and motivation to those that follow.By comparison,a manager administers the resources of the organization.He or she creates budgets,authorizes expenditures,and hires employees.
A(n)____________________ is an act against an asset that could result in a loss.
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
attack
Which type of attack involves sending a large number of connection or information requests to a target?
(Multiple Choice)
4.8/5
(32)
The first step in solving problems is to gather facts and make assumptions.
(True/False)
4.9/5
(34)
Human error or failure often can be prevented with training,ongoing awareness activities, and ____________________.
(Multiple Choice)
4.8/5
(30)
A(n)____________________ is a potential weakness in an asset or its defensive control(s).
(Short Answer)
4.8/5
(35)
The three levels of planning are strategic planning,tactical planning,and ____________________ planning.
(Short Answer)
4.7/5
(36)
A(n)polymorphic threat is one that over time changes the way it appears to antivirus software programs,making it undetectable by techniques that look for pre-configured signatures.
(True/False)
4.9/5
(26)
The macro virus infects the key operating system files located in a computer's start up sector.
(True/False)
4.8/5
(39)
A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
(Multiple Choice)
4.9/5
(34)
Which of the following is the principle of management that develops,creates,and implements strategies for the accomplishment of objectives?
(Multiple Choice)
4.9/5
(46)
List the steps that can be used as a basic blueprint for solving organizational problems.
(Essay)
4.9/5
(34)
Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?
(Multiple Choice)
4.9/5
(34)
Some information gathering techniques are quite legal,for example,using a Web browser to perform market research.These legal techniques are called,collectively,competitive ____________________.
(Short Answer)
4.9/5
(40)
A short-term interruption in electrical power availability is known as a ____.
(Multiple Choice)
4.8/5
(33)
As frustrating as viruses and worms are,perhaps more time and money is spent on resolving virus ____________________.
(Multiple Choice)
4.8/5
(37)
When voltage levels lag (experience a momentary increase),the extra voltage can severely damage or destroy equipment.
(True/False)
4.8/5
(33)
Showing 1 - 20 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)