Exam 15: It Security Controls,plans,and Procedures

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Appropriate security awareness training for all personnel in an organization,along with specific training relating to particular systems and controls,is an essential component in implementing controls.

(True/False)
4.8/5
(42)

_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

(Multiple Choice)
4.9/5
(37)

Controls can be classified as belonging to one of the following classes: management controls,operational controls,technical controls,detection and recovery controls,preventative controls,and _______ controls.

(Essay)
4.8/5
(49)

Periodically reviewing controls to verify that they still function as intended,upgrading controls when new requirements are discovered,ensuring that changes to systems do not adversely affect the controls,and ensuring new threats or vulnerabilities have not become known are all ________ tasks.

(Multiple Choice)
4.8/5
(33)

Incident response is part of the ________ class of security controls.

(Essay)
4.7/5
(32)

The _______ plan documents what needs to be done for each selected control,along with the personnel responsible,and the resources and time frame to be used.

(Essay)
4.8/5
(36)

Once in place controls cannot be adjusted,regardless of the results of risk assessment of systems in the organization.

(True/False)
5.0/5
(42)

A _________ on an organization's IT systems identifies areas needing treatment.

(Essay)
4.8/5
(28)

The objective of the ________ control category is to avoid breaches of any law,statutory,regulatory,or contractual obligations,and of any security requirements.

(Multiple Choice)
4.8/5
(33)

The _________ controls focus on the response to a security breach,by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.

(Essay)
4.8/5
(37)

The recommended controls need to be compatible with the organization's systems and policies.

(True/False)
4.8/5
(24)

When the implementation is successfully completed,_______ needs to authorize the system for operational use.

(Essay)
4.9/5
(30)

The IT security management process ends with the implementation of controls and the training of personnel.

(True/False)
4.7/5
(30)

Detection and recovery controls provide a means to restore lost computing resources.

(True/False)
4.9/5
(41)

The implementation phase comprises not only the direct implementation of the controls,but also the associated training and general security awareness programs for the organization.

(True/False)
4.9/5
(30)

Identification and authentication is part of the _______ class of security controls.

(Multiple Choice)
4.7/5
(34)

The implementation process is typically monitored by the organizational ______.

(Multiple Choice)
4.8/5
(30)

________ controls focus on the response to a security breach,by warning of violations or attempted violations of security policies.

(Multiple Choice)
5.0/5
(36)

The ________ audit process should be conducted on new IT systems and services once they are implanted;and on existing systems periodically,often as part of a wider,general audit of the organization or whenever changes are made to the organization's security policy.

(Essay)
4.9/5
(39)

An IT security plan should include details of _________.

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)