Deck 1: Assessment
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/7
Play
Full screen (f)
Deck 1: Assessment
1
What analytical technique prevents individuals in a group from feeling pressured to go along with others in the group?
A)Scenario Technique
B)Qualitative Technique
C)Delphi Technique
D)Protection Mechanisms
A)Scenario Technique
B)Qualitative Technique
C)Delphi Technique
D)Protection Mechanisms
Delphi Technique
2
Mike is not sure the software he developed is any good. Steve suggests he should run the software through several tests to check. Which item is not a testing method?
A)Unit Testing
B)Digression Testing
C)Regression Testing
D)Acceptance Testing
A)Unit Testing
B)Digression Testing
C)Regression Testing
D)Acceptance Testing
Digression Testing
3
What type of testing is the process of simulating attacks on a network and its systems at the request of the owner or senior management?
A)Toolbox Testing
B)Penetration Testing
C)Computer-aided Testing
D)Extreme Testing
A)Toolbox Testing
B)Penetration Testing
C)Computer-aided Testing
D)Extreme Testing
Penetration Testing
4
What method can be used for determining functions, identifying functional failures, assessing the causes of failure and their failure effects through a structured process?
A)Failure Modes Effect Analysis
B)Qualitative Risk Analysis
C)Handling Analysis
D)None of the Above
A)Failure Modes Effect Analysis
B)Qualitative Risk Analysis
C)Handling Analysis
D)None of the Above
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
5
Who provides a method for independently ensuring that management and shareholders of an organization can rely upon the appropriateness of security objectives?
A)Data Custodian
B)Data Owner
C)Auditor
D)Security Administrator
A)Data Custodian
B)Data Owner
C)Auditor
D)Security Administrator
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
6
For all the efforts a company can take to protect their assets and sensitive information, it may prove to be useless unless their systems are checked to ensure all areas of security are working properly and providing full protection. What would these checks be called?
A)Testing Drills
B)Security Testing
C)Physical Access Auditing
D)Patrol Drills
A)Testing Drills
B)Security Testing
C)Physical Access Auditing
D)Patrol Drills
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
7
Whose function is it to provide a method for ensuring independently that management and shareholders of an organization can rely on security objectives?
A)CEO
B)Independent Contractor
C)Auditor
D)Investigator
A)CEO
B)Independent Contractor
C)Auditor
D)Investigator
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck