Deck 5: Asset Identification and Characterization
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 5: Asset Identification and Characterization
1
The ISO standard for information security is
A) ISO 9000
B) ISO 27002
C) ISO 14000
D) ISO 3166
A) ISO 9000
B) ISO 27002
C) ISO 14000
D) ISO 3166
B
2
Asset criticality is usually associated with the impact of an asset on
A) Confidentiality
B) Integrity
C) Availability
D) Sensitivity
A) Confidentiality
B) Integrity
C) Availability
D) Sensitivity
C
3
Tracking attributes are used for
A) Software assets
B) Personnel assets
C) Hardware assets
D) Information assets
A) Software assets
B) Personnel assets
C) Hardware assets
D) Information assets
C
4
Software assets are
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
In most organizations, the most important assets from the perspective of information security are
A) Hardware assets
B) Information assets
C) Software assets
D) Personnel assets
A) Hardware assets
B) Information assets
C) Software assets
D) Personnel assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Asset criticality refers to
A) A measure of the importance of an asset to the immediate survival of an organization
B) Contractual arrangements that guide the use of hardware and software assets within the organization
C) Adverse consequences for the organization upon disclosure of information
D) Damage caused to the organization from a breach of confidentiality or violation of integrity of an asset
A) A measure of the importance of an asset to the immediate survival of an organization
B) Contractual arrangements that guide the use of hardware and software assets within the organization
C) Adverse consequences for the organization upon disclosure of information
D) Damage caused to the organization from a breach of confidentiality or violation of integrity of an asset
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Based on sensitivity, assets are classified as
A) Essential, required, deferrable
B) Restricted, unrestricted
C) Information, personnel, hardware
D) Hardware, software, legal
A) Essential, required, deferrable
B) Restricted, unrestricted
C) Information, personnel, hardware
D) Hardware, software, legal
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Personnel assets are
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Hardware assets are
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Based on criticality, assets are classified as
A) Restricted, unrestricted
B) Essential, required, deferrable
C) Information, personnel, hardware
D) Hardware, software, legal
A) Restricted, unrestricted
B) Essential, required, deferrable
C) Information, personnel, hardware
D) Hardware, software, legal
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Information assets are
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
A) Software tools needed to accomplish the organization's mission
B) Digitally stored content owned by an individual or organization
C) Employees whose departure could adversely affect the organization
D) Machinery involved in supporting the business
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
An example of a top-down approach to asset identification is
A) Reading the mission statement of the organization
B) Talking to co-workers
C) Reading on-boarding documentation
D) All of the above
A) Reading the mission statement of the organization
B) Talking to co-workers
C) Reading on-boarding documentation
D) All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Essential assets are those whose loss of availability
A) Could be acceptable
B) Could be tolerated for a short period of time
C) Could cause confidentiality breaches
D) Would cause immediate severe repercussions to the organization
A) Could be acceptable
B) Could be tolerated for a short period of time
C) Could cause confidentiality breaches
D) Would cause immediate severe repercussions to the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The majority of information security incidents are identified by
A) Organizations other than the affected organization
B) Investigators
C) The affected organizations
D) Law enforcement
A) Organizations other than the affected organization
B) Investigators
C) The affected organizations
D) Law enforcement
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The parameters used to characterize assets are
A) Asset sensitivity and asset criticality
B) Asset confidentiality and asset restrictions
C) Restricted and unrestricted assets
D) Essential, required and deferrable assets
A) Asset sensitivity and asset criticality
B) Asset confidentiality and asset restrictions
C) Restricted and unrestricted assets
D) Essential, required and deferrable assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Asset sensitivity refers to
A) Data that cannot be disclosed to outsiders
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Data that is not classified as restricted
A) Data that cannot be disclosed to outsiders
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Data that is not classified as restricted
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Bottom-up and top down approaches are needed to identify
A) Asset priorities
B) General assets
C) Assets
D) Idiosyncratic assets
A) Asset priorities
B) General assets
C) Assets
D) Idiosyncratic assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Restricted assets are
A) Assets whose loss would cause severe repercussions to the organization immediately
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Assets whose disclosure or alteration would have adverse consequences for the organization
A) Assets whose loss would cause severe repercussions to the organization immediately
B) Importance of an asset to the immediate survival of an organization
C) The damage caused to an organization from a breach of confidentiality or integrity of an asset
D) Assets whose disclosure or alteration would have adverse consequences for the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Methods of hardware asset discovery include
A) Network scanning
B) Asset reviews
C) Purchase reviews
D) All of the above
A) Network scanning
B) Asset reviews
C) Purchase reviews
D) All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Checklist based approaches can be used to identify
A) Asset priorities
B) Idiosyncratic assets
C) General assets
D) Assets
A) Asset priorities
B) Idiosyncratic assets
C) General assets
D) Assets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Required assets are those whose loss of availability
A) Could be tolerated for a short period of time
B) Could be acceptable
C) Is not acceptable even for a short period of time
D) Would cause immediate severe repercussions to the organization
A) Could be tolerated for a short period of time
B) Could be acceptable
C) Is not acceptable even for a short period of time
D) Would cause immediate severe repercussions to the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
The stages in an IT asset life cycle include
A) Reduce, reuse, recycle
B) Plan, do, check, act
C) Plan, acquire, deploy, manage, retire
D) Concept, definition, launch, perform, close
A) Reduce, reuse, recycle
B) Plan, do, check, act
C) Plan, acquire, deploy, manage, retire
D) Concept, definition, launch, perform, close
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Deferrable assets are those whose loss of availability
A) Could be acceptable
B) Could be tolerated for a short period of time
C) Would cause immediate severe repercussions to the organization
D) Is not acceptable even for a short period of time
A) Could be acceptable
B) Could be tolerated for a short period of time
C) Would cause immediate severe repercussions to the organization
D) Is not acceptable even for a short period of time
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
RFPs, ITNs, ITBs are associated with the
A) Acquiring stage
B) Deployment stage
C) Management stage
D) Planning stage
A) Acquiring stage
B) Deployment stage
C) Management stage
D) Planning stage
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The most appropriate IT lifecycle stage to evaluate an organization's processes is the
A) Retirement stage
B) Deployment stage
C) Management stage
D) Planning stage
A) Retirement stage
B) Deployment stage
C) Management stage
D) Planning stage
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck