Exam 15: It Security Controls,plans,and Procedures
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Appropriate security awareness training for all personnel in an
organization,along with specific training relating to particular systems and controls,is an essential component in implementing controls.
(True/False)
4.8/5
(42)
_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.
(Multiple Choice)
4.9/5
(37)
Controls can be classified as belonging to one of the following classes: management controls,operational controls,technical controls,detection and recovery controls,preventative controls,and _______ controls.
(Essay)
4.8/5
(49)
Periodically reviewing controls to verify that they still function as intended,upgrading controls when new requirements are discovered,ensuring that changes to systems do not adversely affect the controls,and ensuring new threats or vulnerabilities have not become known are all ________ tasks.
(Multiple Choice)
4.8/5
(33)
Incident response is part of the ________ class of security controls.
(Essay)
4.7/5
(32)
The _______ plan documents what needs to be done for each selected control,along with the personnel responsible,and the resources and time frame to be used.
(Essay)
4.8/5
(36)
Once in place controls cannot be adjusted,regardless of the results of
risk assessment of systems in the organization.
(True/False)
5.0/5
(42)
A _________ on an organization's IT systems identifies areas needing treatment.
(Essay)
4.8/5
(28)
The objective of the ________ control category is to avoid breaches of any law,statutory,regulatory,or contractual obligations,and of any security requirements.
(Multiple Choice)
4.8/5
(33)
The _________ controls focus on the response to a security breach,by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.
(Essay)
4.8/5
(37)
The recommended controls need to be compatible with the
organization's systems and policies.
(True/False)
4.8/5
(24)
When the implementation is successfully completed,_______ needs to authorize the system for operational use.
(Essay)
4.9/5
(30)
The IT security management process ends with the implementation of
controls and the training of personnel.
(True/False)
4.7/5
(30)
Detection and recovery controls provide a means to restore lost
computing resources.
(True/False)
4.9/5
(41)
The implementation phase comprises not only the direct
implementation of the controls,but also the associated training and general security awareness programs for the organization.
(True/False)
4.9/5
(30)
Identification and authentication is part of the _______ class of security controls.
(Multiple Choice)
4.7/5
(34)
The implementation process is typically monitored by the organizational ______.
(Multiple Choice)
4.8/5
(30)
________ controls focus on the response to a security breach,by warning of violations or attempted violations of security policies.
(Multiple Choice)
5.0/5
(36)
The ________ audit process should be conducted on new IT systems and services once they are implanted;and on existing systems periodically,often as part of a wider,general audit of the organization or whenever changes are made to the organization's security policy.
(Essay)
4.9/5
(39)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)