Exam 15: IT Security Controls, Plans, and Procedures
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Physical access or environmental controls are only relevant to areashousing the relevant equipment.
(True/False)
4.9/5
(38)
The recommended controls need to be compatible with theorganization's systems and policies.
(True/False)
4.9/5
(43)
Incident response is part of the ________ class of security controls.
(Short Answer)
4.8/5
(36)
Management controls refer to issues that management needs to address.
(True/False)
4.8/5
(37)
_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.
(Multiple Choice)
4.9/5
(34)
_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
(Short Answer)
4.8/5
(31)
_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.
(Multiple Choice)
4.9/5
(40)
The IT security management process ends with the implementation ofcontrols and the training of personnel.
(True/False)
4.8/5
(37)
The three steps for IT security management controls and implementation are: prioritize risks, respond to risks, and __________ .
(Short Answer)
4.9/5
(33)
_______ management is the process used to review proposed changes to systems for implications on the organization's systems and use.
(Short Answer)
4.7/5
(36)
Once in place controls cannot be adjusted, regardless of the results ofrisk assessment of systems in the organization.
(True/False)
4.7/5
(36)
A contingency plan for systems critical to a large organization would be _________ than that for a small business.
(Multiple Choice)
4.9/5
(42)
The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.
(Multiple Choice)
4.9/5
(39)
Contingency planning falls into the _________ class of security controls.
(Short Answer)
4.9/5
(48)
The implementation process is typically monitored by the organizational ______.
(Multiple Choice)
4.9/5
(36)
It is likely that the organization will not have the resources toimplement all the recommended controls.
(True/False)
4.8/5
(38)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)