Exam 14: It Security Management and Risk Assessment
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The term ________ refers to a document that details not only the overall security objectives and strategies,but also procedural policies that define acceptable behavior,expected practices,and responsibilities.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
security policy
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
detailed
Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
A
IT security needs to be a key part of an organization's overall
management plan.
(True/False)
4.8/5
(40)
IT security management has evolved considerably over the last few
decades due to the rise in risks to networked systems.
(True/False)
4.7/5
(32)
It is not critical that an organization's IT security policy have full
approval or buy-in by senior management.
(True/False)
4.7/5
(37)
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.
(Short Answer)
5.0/5
(38)
IT security management consists of first determining a clear view of an
organization's IT security objectives and general risk profile.
(True/False)
4.9/5
(36)
Establishing security policy,objectives,processes and procedures is part of the ______ step.
(Multiple Choice)
4.8/5
(34)
_________ is a process used to achieve and maintain appropriate levels of confidentiality,integrity,availability,accountability,authenticity,and reliability.
(Short Answer)
4.9/5
(36)
The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.
(Multiple Choice)
4.8/5
(40)
The level of risk the organization views as acceptable is the organization's __________.
(Short Answer)
4.9/5
(35)
The _________ approach combines elements of the baseline,informal,and detailed risk analysis approaches.
(Short Answer)
4.9/5
(31)
A major disadvantage of the baseline risk assessment approach is the
significant cost in time,resources,and expertise needed to perform
the analysis.
(True/False)
4.8/5
(32)
ISO details a model process for managing information security that comprises the following steps: plan,do,________,and act.
(Short Answer)
4.9/5
(33)
Legal and regulatory constraints may require specific approaches to
risk assessment.
(True/False)
4.8/5
(29)
A major advantage of the informal approach is that the individuals
performing the analysis require no additional skills.
(True/False)
4.9/5
(41)
The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents,codes of practice,and industry best practice.
(Short Answer)
4.9/5
(42)
One asset may have multiple threats and a single threat may target
multiple assets.
(True/False)
4.7/5
(35)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)