Exam 15: It Security Controls, plans, and Procedures
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Controls can be classified as belonging to one of the following classes: management controls,operational controls,technical controls,detection and recovery controls,preventative controls,and _______ controls.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
supportive
The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically,often as part of a wider,general audit of the organization or whenever changes are made to the organization's security policy.
Free
(Short Answer)
4.8/5
(47)
Correct Answer:
security compliance
______ checking is an audit process to review the organization's security processes.
Free
(Short Answer)
4.9/5
(42)
Correct Answer:
Security compliance
A contingency plan for systems critical to a large organization would be _________ than that for a small business.
(Multiple Choice)
4.7/5
(40)
The _______ plan documents what needs to be done for each selected control,along with the personnel responsible,and the resources and time frame to be used.
(Short Answer)
4.8/5
(30)
Management controls refer to issues that management needs to address.
(True/False)
4.8/5
(34)
_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
(Short Answer)
4.9/5
(40)
_______ management is concerned with specifically keeping track of the configuration of each system in use and the changes made to each.
(Short Answer)
4.8/5
(44)
Contingency planning falls into the _________ class of security controls.
(Short Answer)
4.8/5
(30)
The implementation process is typically monitored by the organizational ______.
(Multiple Choice)
5.0/5
(39)
_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.
(Multiple Choice)
4.8/5
(36)
________ is a means of managing risk,including policies,procedures,guidelines,practices,or organizational structures.
(Short Answer)
4.9/5
(28)
Physical access or environmental controls are only relevant to areas
housing the relevant equipment.
(True/False)
4.9/5
(34)
Appropriate security awareness training for all personnel in an
organization,along with specific training relating to particular systems and controls,is an essential component in implementing controls.
(True/False)
4.7/5
(37)
Periodically reviewing controls to verify that they still function as intended,upgrading controls when new requirements are discovered,ensuring that changes to systems do not adversely affect the controls,and ensuring new threats or vulnerabilities have not become known are all ________ tasks.
(Multiple Choice)
4.9/5
(37)
The IT security management process ends with the implementation of
controls and the training of personnel.
(True/False)
4.7/5
(33)
When the implementation is successfully completed,_______ needs to authorize the system for operational use.
(Short Answer)
4.9/5
(33)
The implementation phase comprises not only the direct
implementation of the controls,but also the associated training and general security awareness programs for the organization.
(True/False)
4.8/5
(35)
Controls may vary in size and complexity in relation to the
organization employing them.
(True/False)
4.8/5
(37)
Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)