Exam 15: IT Security Controls, Plans, and Procedures

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

B

Controls can be classified as belonging to one of the following classes: management controls, operational controls, technical controls, detection and recovery controls, preventative controls, and _______ controls.

Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Verified

supportive

Operational controls range from simple to complex measures that worktogether to secure critical and sensitive data, information, and IT systems functions.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

Controls may vary in size and complexity in relation to theorganization employing them.

(True/False)
4.9/5
(32)

_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

(Multiple Choice)
4.8/5
(36)

The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically, often as part of a wider, general audit of the organization or whenever changes are made to the organization's security policy.

(Short Answer)
4.8/5
(39)

______ checking is an audit process to review the organization's security processes.

(Short Answer)
4.9/5
(39)

The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

(Multiple Choice)
4.9/5
(37)

Identification and authentication is part of the _______ class of security controls.

(Multiple Choice)
4.8/5
(38)

When the implementation is successfully completed, _______ needs to authorize the system for operational use.

(Short Answer)
4.8/5
(39)

A _________ on an organization's IT systems identifies areas needing treatment.

(Short Answer)
4.7/5
(35)

________ controls involve the correct use of hardware and software security capabilities in systems.

(Short Answer)
4.8/5
(41)

________ is a means of managing risk, including policies, procedures, guidelines, practices, or organizational structures.

(Short Answer)
4.8/5
(32)

_______ management is concerned with specifically keeping track of the configuration of each system in use and the changes made to each.

(Short Answer)
4.9/5
(37)

The follow-up stage of the management process includes _________.

(Multiple Choice)
4.8/5
(31)

To ensure that a suitable level of security is maintained, managementmust follow up the implementation with an evaluation of the effectiveness of the security controls.

(True/False)
4.8/5
(37)

Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.

(Multiple Choice)
4.8/5
(24)

Appropriate security awareness training for all personnel in anorganization, along with specific training relating to particular systems and controls, is an essential component in implementing controls.

(True/False)
4.9/5
(31)

The implementation phase comprises not only the directimplementation of the controls, but also the associated training and general security awareness programs for the organization.

(True/False)
4.9/5
(39)

Detection and recovery controls provide a means to restore lostcomputing resources.

(True/False)
4.9/5
(27)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)