Exam 15: It Security Controls,plans,and Procedures
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Physical access or environmental controls are only relevant to areas
housing the relevant equipment.
Free
(True/False)
4.8/5
(44)
Correct Answer:
True
An IT security ________ helps to reduce risks.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
D
Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
B
Management controls refer to issues that management needs to address.
(True/False)
4.9/5
(28)
A contingency plan for systems critical to a large organization would be _________ than that for a small business.
(Multiple Choice)
4.9/5
(36)
______ checking is an audit process to review the organization's security processes.
(Essay)
4.8/5
(30)
________ controls involve the correct use of hardware and software security capabilities in systems.
(Essay)
4.8/5
(32)
_______ management is concerned with specifically keeping track of the configuration of each system in use and the changes made to each.
(Essay)
4.8/5
(37)
_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
(Essay)
4.8/5
(34)
To ensure that a suitable level of security is maintained,management
must follow up the implementation with an evaluation of the effectiveness of the security controls.
(True/False)
4.8/5
(30)
The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.
(Multiple Choice)
4.8/5
(35)
_______ controls focus on security policies,planning,guidelines,and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.
(Multiple Choice)
4.8/5
(34)
It is likely that the organization will not have the resources to
implement all the recommended controls.
(True/False)
4.9/5
(32)
The three steps for IT security management controls and implementation are: prioritize risks,respond to risks,and __________ .
(Essay)
4.8/5
(31)
Operational controls range from simple to complex measures that work
together to secure critical and sensitive data,information,and IT systems functions.
(True/False)
4.8/5
(35)
________ is a means of managing risk,including policies,procedures,guidelines,practices,or organizational structures.
(Essay)
4.8/5
(29)
Maintenance of security controls,security compliance checking,change and configuration management,and incident handling are all included in the follow-up stage of the _________ process.
(Multiple Choice)
4.9/5
(33)
The follow-up stage of the management process includes _________.
(Multiple Choice)
4.8/5
(27)
Contingency planning falls into the _________ class of security controls.
(Essay)
4.9/5
(39)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)