Exam 15: It Security Controls, plans, and Procedures

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All controls are applicable to all technologies.

(True/False)
4.8/5
(37)

Incident response is part of the ________ class of security controls.

(Short Answer)
4.9/5
(34)

Maintenance of security controls,security compliance checking,change and configuration management,and incident handling are all included in the follow-up stage of the _________ process.

(Multiple Choice)
4.8/5
(35)

It is likely that the organization will not have the resources to implement all the recommended controls.

(True/False)
4.9/5
(29)

Once in place controls cannot be adjusted,regardless of the results of risk assessment of systems in the organization.

(True/False)
4.8/5
(32)

Operational controls range from simple to complex measures that work together to secure critical and sensitive data,information,and IT systems functions.

(True/False)
4.8/5
(44)

The recommended controls need to be compatible with the organization's systems and policies.

(True/False)
5.0/5
(33)

Detection and recovery controls provide a means to restore lost computing resources.

(True/False)
4.8/5
(38)

_______ controls are pervasive,generic,underlying technical IT security capabilities that are interrelated with,and used by,many other controls.

(Multiple Choice)
5.0/5
(36)

Controls can be classified as belonging to one of the following classes: management controls,__________,and technical controls.

(Short Answer)
4.8/5
(42)

Water damage protection is included in security controls.

(True/False)
4.8/5
(26)

The follow-up stage of the management process includes _________.

(Multiple Choice)
4.9/5
(45)

________ controls involve the correct use of hardware and software security capabilities in systems.

(Short Answer)
4.8/5
(28)

Identification and authentication is part of the _______ class of security controls.

(Multiple Choice)
4.8/5
(33)

The objective of the ________ control category is to avoid breaches of any law,statutory,regulatory,or contractual obligations,and of any security requirements.

(Multiple Choice)
4.8/5
(34)

A _________ on an organization's IT systems identifies areas needing treatment.

(Short Answer)
4.8/5
(37)

________ controls focus on the response to a security breach,by warning of violations or attempted violations of security policies.

(Multiple Choice)
4.8/5
(36)

An IT security ________ helps to reduce risks.

(Multiple Choice)
4.7/5
(34)

_______ controls focus on security policies,planning,guidelines,and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.

(Multiple Choice)
4.8/5
(32)

The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

(Multiple Choice)
4.8/5
(29)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)