Exam 15: IT Security Controls, Plans, and Procedures

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _______ plan documents what needs to be done for each selected control, along with the personnel responsible, and the resources and time frame to be used.

(Short Answer)
4.7/5
(41)

The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.

(Short Answer)
4.9/5
(35)

Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process.

(Multiple Choice)
4.7/5
(24)

________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.

(Multiple Choice)
4.7/5
(27)

The selection of recommended controls is not guided by legalrequirements.

(True/False)
4.9/5
(26)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)