Exam 5: Asset Identification and Characterization

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Software assets are

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

The majority of information security incidents are identified by

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

A

An example of a top-down approach to asset identification is

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

A

Hardware assets are

(Multiple Choice)
4.7/5
(32)

Based on sensitivity, assets are classified as

(Multiple Choice)
4.8/5
(37)

Asset criticality is usually associated with the impact of an asset on

(Multiple Choice)
4.7/5
(35)

The stages in an IT asset life cycle include

(Multiple Choice)
4.7/5
(33)

Bottom-up and top down approaches are needed to identify

(Multiple Choice)
4.8/5
(31)

RFPs, ITNs, ITBs are associated with the

(Multiple Choice)
4.7/5
(43)

Methods of hardware asset discovery include

(Multiple Choice)
4.7/5
(34)

Required assets are those whose loss of availability

(Multiple Choice)
4.8/5
(32)

Based on criticality, assets are classified as

(Multiple Choice)
4.9/5
(30)

Information assets are

(Multiple Choice)
4.7/5
(35)

Asset criticality refers to

(Multiple Choice)
5.0/5
(33)

The ISO standard for information security is

(Multiple Choice)
4.9/5
(36)

The parameters used to characterize assets are

(Multiple Choice)
4.7/5
(39)

The most appropriate IT lifecycle stage to evaluate an organization's processes is the

(Multiple Choice)
4.9/5
(40)

Restricted assets are

(Multiple Choice)
4.8/5
(42)

Personnel assets are

(Multiple Choice)
5.0/5
(32)

Tracking attributes are used for

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)