Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A separate network located outside the organization's internal information system that permits controlled access from the Internet to selected resources is known as a(n)

(Multiple Choice)
4.9/5
(36)

Which of the following is not one of the three fundamental information security concepts?

(Multiple Choice)
4.8/5
(36)

Describe the three types of detective controls that enable organizations timely detection of intrusions and problems.

(Essay)
4.9/5
(37)

Which of the following is commonly true of the default settings for most commercially available wireless access points?

(Multiple Choice)
4.8/5
(46)

Describe the five principles of the Trust Services Framework.Select one of the principles and discuss the why it is important to an organization.

(Essay)
4.9/5
(37)

The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.

(Multiple Choice)
4.8/5
(35)

In the time-based model of information security,R represents

(Multiple Choice)
4.8/5
(42)

Timely detection of problems is not enough to protect organizations' information resources.

(True/False)
4.8/5
(41)

Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

(Multiple Choice)
4.7/5
(38)

Explain social engineering.

(Essay)
4.8/5
(33)

Describe the concept of Internet of Things (IoT)and its security implications.

(Essay)
4.8/5
(39)

Identify a party below who was involved with developing the Trust Services Framework.

(Multiple Choice)
4.9/5
(45)

The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

(Multiple Choice)
4.7/5
(40)

Why does COBIT5 DSS-05.06 stress the importance of restricting physical access to network printers?

(Multiple Choice)
4.9/5
(37)

New employees of Baker Technologies are assigned user names and appropriate permissions.Their credentials are then entered into the company's information system's access control matrix.This is an example of a(n)

(Multiple Choice)
4.8/5
(41)

Which of the following is an example of a corrective control?

(Multiple Choice)
4.9/5
(37)

In the time-based model of information security,P represents

(Multiple Choice)
4.9/5
(37)

Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.

(Multiple Choice)
4.8/5
(37)

Explain the value of penetration testing.

(Essay)
4.9/5
(35)

Restricting access of users to specific portions of the system as well as specific tasks,is an example of

(Multiple Choice)
4.8/5
(37)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)