Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This network access control determines which IP packets are allowed entry to a network and which are dropped.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

A

Which of the following is an example of a preventive control?

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

A

Describe the steps in the security life cycle.

Free
(Essay)
4.8/5
(30)
Correct Answer:
Verified

There are four steps in the security life cycle.The first step in the security life cycle is to assess the information security-related threats that the organization faces and select an appropriate response.The second step involves developing information security policies and communicating them to all employees.The third step involves the acquisition or building of specific technological tools.The final step in the security life cycle entails regular monitoring of performance to evaluate the effectiveness of the organization's information security program.

According to the Trust Services Framework,the reliability principle of availability is achieved when the system produces data that

(Multiple Choice)
4.9/5
(36)

Who bears the responsibility for information security in an organization?

(Multiple Choice)
4.7/5
(39)

Describe the security risks associated with virtualization and cloud computing.

(Essay)
4.9/5
(40)

Identify one aspect of systems reliability that is not a source of concern with regards to a public cloud.

(Multiple Choice)
4.8/5
(40)

Describe what information security process the term hardening refers to.

(Essay)
4.8/5
(39)

Organizations are infrequently the target of deliberate attacks.

(True/False)
4.8/5
(40)

Social engineering attacks often take place over the Internet.

(True/False)
4.8/5
(52)

Identify the primary means of protecting data stored in a cloud from unauthorized access.

(Multiple Choice)
4.8/5
(31)

ShareIt is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(n)

(Multiple Choice)
4.8/5
(31)

The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)

(Multiple Choice)
5.0/5
(31)

COBIT 5 management practice APO01.08 stresses the importance of ________ of both employee compliance with the organization's information security policies and overall performance of business processes.

(Multiple Choice)
4.9/5
(30)

The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as

(Multiple Choice)
4.9/5
(49)

According to the Trust Services Framework,the confidentiality principle of integrity is achieved when the system produces data that

(Multiple Choice)
4.9/5
(30)

A demilitarized zone

(Multiple Choice)
4.8/5
(47)

The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as

(Multiple Choice)
4.8/5
(37)

The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as

(Multiple Choice)
4.9/5
(34)

The most effective method for protecting an organization from social engineering attacks is providing

(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)