Exam 15: IT Security Controls, Plans, and Procedures
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
B
Controls can be classified as belonging to one of the following classes: management controls, operational controls, technical controls, detection and recovery controls, preventative controls, and _______ controls.
Free
(Short Answer)
4.7/5
(37)
Correct Answer:
supportive
Operational controls range from simple to complex measures that worktogether to secure critical and sensitive data, information, and IT systems functions.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
Controls may vary in size and complexity in relation to theorganization employing them.
(True/False)
4.9/5
(32)
_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.
(Multiple Choice)
4.8/5
(36)
The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically, often as part of a wider, general audit of the organization or whenever changes are made to the organization's security policy.
(Short Answer)
4.8/5
(39)
______ checking is an audit process to review the organization's security processes.
(Short Answer)
4.9/5
(39)
The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.
(Multiple Choice)
4.9/5
(37)
Identification and authentication is part of the _______ class of security controls.
(Multiple Choice)
4.8/5
(38)
When the implementation is successfully completed, _______ needs to authorize the system for operational use.
(Short Answer)
4.8/5
(39)
A _________ on an organization's IT systems identifies areas needing treatment.
(Short Answer)
4.7/5
(35)
________ controls involve the correct use of hardware and software security capabilities in systems.
(Short Answer)
4.8/5
(41)
________ is a means of managing risk, including policies, procedures, guidelines, practices, or organizational structures.
(Short Answer)
4.8/5
(32)
_______ management is concerned with specifically keeping track of the configuration of each system in use and the changes made to each.
(Short Answer)
4.9/5
(37)
The follow-up stage of the management process includes _________.
(Multiple Choice)
4.8/5
(31)
To ensure that a suitable level of security is maintained, managementmust follow up the implementation with an evaluation of the effectiveness of the security controls.
(True/False)
4.8/5
(37)
Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.
(Multiple Choice)
4.8/5
(24)
Appropriate security awareness training for all personnel in anorganization, along with specific training relating to particular systems and controls, is an essential component in implementing controls.
(True/False)
4.9/5
(31)
The implementation phase comprises not only the directimplementation of the controls, but also the associated training and general security awareness programs for the organization.
(True/False)
4.9/5
(39)
Detection and recovery controls provide a means to restore lostcomputing resources.
(True/False)
4.9/5
(27)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)