Deck 5: Asset Identification and Characterization

Full screen (f)
exit full mode
Question
The ISO standard for information security is

A) ISO 9000
B) ISO 27002
C) ISO 14000
D) ISO 3166
Use Space or
up arrow
down arrow
to flip the card.
Question
Asset criticality is usually associated with the impact of an asset on

A) Confidentiality
B) Integrity
C) Availability
D) Sensitivity
Question
Tracking attributes are used for

A) Software assets
B) Personnel assets
C) Hardware assets
D) Information assets
Question
Software assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Question
In most organizations, the most important assets from the perspective of information security are

A) Hardware assets
B) Information assets
C) Software assets
D) Personnel assets
Question
Asset criticality refers to

A) A measure of the importance of an asset to the immediate survival of an organization
B) Contractual arrangements that guide the use of hardware and software assets within the organization
C) Adverse consequences for the organization upon disclosure of information
D) Damage caused to the organization from a breach of confidentiality or violation of integrity of an asset
Question
Based on sensitivity, assets are classified as

A) Essential, required, deferrable
B) Restricted, unrestricted
C) Information, personnel, hardware
D) Hardware, software, legal
Question
Personnel assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Question
Hardware assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Question
Based on criticality, assets are classified as

A) Restricted, unrestricted
B) Essential, required, deferrable
C) Information, personnel, hardware
D) Hardware, software, legal
Question
Information assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Question
An example of a top-down approach to asset identification is

A) Reading the mission statement of the organization
B) Talking to co-workers
C) Reading on-boarding documentation
D) All of the above
Question
Essential assets are those whose loss of availability

A) Could be acceptable
B) Could be tolerated for a short period of time
C) Could cause confidentiality breaches
D) Would cause immediate severe repercussions to the organization
Question
The majority of information security incidents are identified by

A) Organizations other than the affected organization
B) Investigators
C) The affected organizations
D) Law enforcement
Question
The parameters used to characterize assets are

A) Asset sensitivity and asset criticality
B) Asset confidentiality and asset restrictions
C) Restricted and unrestricted assets
D) Essential, required and deferrable assets
Question
Asset sensitivity refers to

A) Data that cannot be disclosed to outsiders
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Data that is not classified as restricted
Question
Bottom-up and top down approaches are needed to identify

A) Asset priorities
B) General assets
C) Assets
D) Idiosyncratic assets
Question
Restricted assets are

A) Assets whose loss would cause severe repercussions to the organization immediately
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Assets whose disclosure or alteration would have adverse consequences for the organization
Question
Methods of hardware asset discovery include

A) Network scanning
B) Asset reviews
C) Purchase reviews
D) All of the above
Question
Checklist based approaches can be used to identify

A) Asset priorities
B) Idiosyncratic assets
C) General assets
D) Assets
Question
Required assets are those whose loss of availability

A) Could be tolerated for a short period of time
B) Could be acceptable
C) Is not acceptable even for a short period of time
D) Would cause immediate severe repercussions to the organization
Question
The stages in an IT asset life cycle include

A) Reduce, reuse, recycle
B) Plan, do, check, act
C) Plan, acquire, deploy, manage, retire
D) Concept, definition, launch, perform, close
Question
Deferrable assets are those whose loss of availability

A) Could be acceptable
B) Could be tolerated for a short period of time
C) Would cause immediate severe repercussions to the organization
D) Is not acceptable even for a short period of time
Question
RFPs, ITNs, ITBs are associated with the

A) Acquiring stage
B) Deployment stage
C) Management stage
D) Planning stage
Question
The most appropriate IT lifecycle stage to evaluate an organization's processes is the

A) Retirement stage
B) Deployment stage
C) Management stage
D) Planning stage
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Asset Identification and Characterization
1
The ISO standard for information security is

A) ISO 9000
B) ISO 27002
C) ISO 14000
D) ISO 3166
B
2
Asset criticality is usually associated with the impact of an asset on

A) Confidentiality
B) Integrity
C) Availability
D) Sensitivity
C
3
Tracking attributes are used for

A) Software assets
B) Personnel assets
C) Hardware assets
D) Information assets
C
4
Software assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
In most organizations, the most important assets from the perspective of information security are

A) Hardware assets
B) Information assets
C) Software assets
D) Personnel assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Asset criticality refers to

A) A measure of the importance of an asset to the immediate survival of an organization
B) Contractual arrangements that guide the use of hardware and software assets within the organization
C) Adverse consequences for the organization upon disclosure of information
D) Damage caused to the organization from a breach of confidentiality or violation of integrity of an asset
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Based on sensitivity, assets are classified as

A) Essential, required, deferrable
B) Restricted, unrestricted
C) Information, personnel, hardware
D) Hardware, software, legal
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Personnel assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Hardware assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Based on criticality, assets are classified as

A) Restricted, unrestricted
B) Essential, required, deferrable
C) Information, personnel, hardware
D) Hardware, software, legal
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Information assets are

A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
An example of a top-down approach to asset identification is

A) Reading the mission statement of the organization
B) Talking to co-workers
C) Reading on-boarding documentation
D) All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Essential assets are those whose loss of availability

A) Could be acceptable
B) Could be tolerated for a short period of time
C) Could cause confidentiality breaches
D) Would cause immediate severe repercussions to the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The majority of information security incidents are identified by

A) Organizations other than the affected organization
B) Investigators
C) The affected organizations
D) Law enforcement
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The parameters used to characterize assets are

A) Asset sensitivity and asset criticality
B) Asset confidentiality and asset restrictions
C) Restricted and unrestricted assets
D) Essential, required and deferrable assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Asset sensitivity refers to

A) Data that cannot be disclosed to outsiders
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Data that is not classified as restricted
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Bottom-up and top down approaches are needed to identify

A) Asset priorities
B) General assets
C) Assets
D) Idiosyncratic assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Restricted assets are

A) Assets whose loss would cause severe repercussions to the organization immediately
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Assets whose disclosure or alteration would have adverse consequences for the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Methods of hardware asset discovery include

A) Network scanning
B) Asset reviews
C) Purchase reviews
D) All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Checklist based approaches can be used to identify

A) Asset priorities
B) Idiosyncratic assets
C) General assets
D) Assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Required assets are those whose loss of availability

A) Could be tolerated for a short period of time
B) Could be acceptable
C) Is not acceptable even for a short period of time
D) Would cause immediate severe repercussions to the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
The stages in an IT asset life cycle include

A) Reduce, reuse, recycle
B) Plan, do, check, act
C) Plan, acquire, deploy, manage, retire
D) Concept, definition, launch, perform, close
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Deferrable assets are those whose loss of availability

A) Could be acceptable
B) Could be tolerated for a short period of time
C) Would cause immediate severe repercussions to the organization
D) Is not acceptable even for a short period of time
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
RFPs, ITNs, ITBs are associated with the

A) Acquiring stage
B) Deployment stage
C) Management stage
D) Planning stage
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The most appropriate IT lifecycle stage to evaluate an organization's processes is the

A) Retirement stage
B) Deployment stage
C) Management stage
D) Planning stage
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.