Exam 15: It Security Controls, plans, and Procedures
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Incident response is part of the ________ class of security controls.
(Short Answer)
4.9/5
(34)
Maintenance of security controls,security compliance checking,change and configuration management,and incident handling are all included in the follow-up stage of the _________ process.
(Multiple Choice)
4.8/5
(35)
It is likely that the organization will not have the resources to
implement all the recommended controls.
(True/False)
4.9/5
(29)
Once in place controls cannot be adjusted,regardless of the results of
risk assessment of systems in the organization.
(True/False)
4.8/5
(32)
Operational controls range from simple to complex measures that work
together to secure critical and sensitive data,information,and IT systems functions.
(True/False)
4.8/5
(44)
The recommended controls need to be compatible with the
organization's systems and policies.
(True/False)
5.0/5
(33)
Detection and recovery controls provide a means to restore lost
computing resources.
(True/False)
4.8/5
(38)
_______ controls are pervasive,generic,underlying technical IT security capabilities that are interrelated with,and used by,many other controls.
(Multiple Choice)
5.0/5
(36)
Controls can be classified as belonging to one of the following classes: management controls,__________,and technical controls.
(Short Answer)
4.8/5
(42)
The follow-up stage of the management process includes _________.
(Multiple Choice)
4.9/5
(45)
________ controls involve the correct use of hardware and software security capabilities in systems.
(Short Answer)
4.8/5
(28)
Identification and authentication is part of the _______ class of security controls.
(Multiple Choice)
4.8/5
(33)
The objective of the ________ control category is to avoid breaches of any law,statutory,regulatory,or contractual obligations,and of any security requirements.
(Multiple Choice)
4.8/5
(34)
A _________ on an organization's IT systems identifies areas needing treatment.
(Short Answer)
4.8/5
(37)
________ controls focus on the response to a security breach,by warning of violations or attempted violations of security policies.
(Multiple Choice)
4.8/5
(36)
_______ controls focus on security policies,planning,guidelines,and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.
(Multiple Choice)
4.8/5
(32)
The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.
(Multiple Choice)
4.8/5
(29)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)