Deck 2: Planning and Policy

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is FALSE about security management?

A) Management is abstract; technology is visible.
B) Security technology is far more important than security management.
C) There are fewer general principles in security management than technology.
D) It is generally a mistake to focus too heavily on security technology compared to security management.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Comprehensive security pertains to ________.

A) closing all routes of attack to their systems to attackers
B) closing all Internet-linked servers to attackers
C) lessening security issues in an entire company
D) decreasing the risk of all computer systems in a company
سؤال
If a failure of a single element of a system will ruin security, this is called a(n) ________.

A) weakest-link failure
B) hybrid solution
C) internal audit
D) risk analysis
سؤال
Process pertains to ________.

A) the plan-protect-respond cycle
B) the systems life cycle
C) a planned series of actions
D) recovery according to plan
سؤال
Which of the following is NOT part of the highest-level security management process that most firms use today to protect against threats?

A) Plan
B) Process
C) Protect
D) Respond
سؤال
The systems development life cycle is most connected to the ________ of the plan-protect-respond cycle of security management.

A) plan
B) process
C) protect
D) respond
سؤال
Response is ________.

A) the second phase of the systems life cycle
B) the plan-based creation and operation of countermeasures
C) a planned series of actions
D) recovery according to plan
سؤال
A firm's primary objective is to make a profit.
سؤال
A firewall administrator should check the log file in a company each week.
سؤال
One reason why security management is difficult is that companies need to protect a large number of resources.
سؤال
Security is too complicated to be managed informally.
سؤال
In the plan-protect-respond cycle, the three activities always take place in sequential order.
سؤال
One key to making security an enabler is to get security involved near the end of most projects.
سؤال
Which of the following produced the greatest change in financial reporting requirement since the Great Depression?

A) The Sarbanes-Oxley Act
B) The General Data Protection Regulation
C) The Gramm-Leach-Bliley Act
D) The Health Insurance Portability and Accountability Act
سؤال
The Sarbanes-Oxley Act was passed in ________.

A) 2000
B) 2002
C) 2010
D) 2012
سؤال
Which of the following is an EU privacy law?

A) The Sarbanes-Oxley Act
B) The General Data Protection Regulation
C) The Gramm-Leach-Bliley Act
D) The Health Insurance Portability and Accountability Act
سؤال
Which of the following is also known as the Financial Services Modernization Act?

A) GDPR
B) GLBA
C) HIPAA
D) SB 1386
سؤال
Which of the following was the first data breach notification law in the U.S.?

A) GDPR
B) GLBA
C) HIPAA
D) SB 1386
سؤال
________ was the last state to implement a data breach notification law in ________.

A) Georgia; 2000
B) Alabama; 2018
C) North Dakota; 2016
D) California; 2018
سؤال
One of the first data breach notification laws in the U.S. was created in ________.

A) California
B) New York
C) Illinois
D) Texas
سؤال
Who has the power to prosecute companies that fail to take reasonable precautions to protect private information?

A) HIPAA
B) FTC
C) GDPR
D) GLBA
سؤال
________ has set the standards for companies that accept credit cards as a form of payment.

A) FISMA
B) FTC
C) PCI-DSS
D) HIPAA
سؤال
Why was FISMA enacted?

A) To set standards for companies that accept credit card payments
B) To set accreditation standards for members of a particular industry
C) To prosecute firms that fail to take reasonable precautions to protect customers' private information
D) To bolster computer and network security within the federal government
سؤال
Compliance laws create requirements to which corporate security must respond.
سؤال
The Sarbanes-Oxley Act was passed in 2012.
سؤال
Given the importance of Sarbanes-Oxley compliance for companies, most firms were forced to increase their security efforts.
سؤال
The GLBA is considered the most important EU privacy rule ever created.
سؤال
There are strong federal laws requiring companies to provide notice of a data breach.
سؤال
HIPAA has the power to require firms to pay to be audited annually by an external firm.
سؤال
The first stage of FISMA is a certification of a system by an organization.
سؤال
Which of the following is considered the first step for a corporation in managing security?

A) To decide where the security function will sit on a firm's organization chart
B) To determine what devices need secured and which software to use to do that
C) To determine the size of the security staff and the budget that will support that staff
D) To decide the objectives of the security function
سؤال
Which of the following is considered a fundamental problem with making IT security a staff department outside IT?

A) Separation reduces accountability.
B) IT security would report to a firm's CIO.
C) Security changes that would need to be made would be easier.
D) Security and IT could share many of the same technological skill set.
سؤال
Which of the following is NOT one of the three auditing departments that are part of most corporations?

A) Financial auditing
B) Internal auditing
C) Outside auditing
D) IT auditing
سؤال
________ in regard to outside IT security means checking out closely the IT security implications of a potential partnership before beginning the relationship.

A) A hybrid solution
B) Internal auditing
C) Risk analysis
D) Due diligence
سؤال
The most common type of IT security outsourcing is done for ________.

A) laptops
B) e-mail
C) all hardware
D) all software
سؤال
An advantage to using an MSSP is ________.

A) cost
B) control of employees
C) constant internal control
D) independence
سؤال
The usual title for a company's security department head is chief security officer.
سؤال
Most analysts recommend placing security outside IT.
سؤال
Most firms have a CSO report direct to the company's CEO.
سؤال
The financial auditing department examines organizational units for efficiency, effectiveness, and adequate controls.
سؤال
IT security is almost always mistrusted by other departments because of security's potential to make life harder.
سؤال
Which of the following compares probable losses with the costs of security protections?

A) Weakest-link failure
B) Reasonable risk
C) Internal audits
D) Risk analysis
سؤال
The ________ of the classic risk analysis calculation is the percentage of an asset's value that would be lost in a breach.

A) single loss expectancy
B) annualized loss expectancy
C) exposure factor
D) countermeasure impact
سؤال
What does a central logging server of an MSSP on a network do?

A) It calculates the amount of processing ability needed for a system.
B) It uploads a firm's event log data.
C) It uploads the number of times that employees have logged into-or attempted to log into-questionable sites.
D) It automatically creates a firewall when questionable activity is detected.
سؤال
Which of the following is an outsourcing alternative?

A) PCI-DSS
B) FISMA
C) MSSP
D) ISO 27000
سؤال
In the classic risk analysis calculation, once you know how much damage an incident may cause from a single breach, the next issue is how frequently breaches will occur. This is normally done on a(n) ________ basis.

A) annualized
B) weekly
C) daily
D) bi-annual
سؤال
In the classic risk analysis calculation, the countermeasure impact assesses the ________.

A) drawbacks of a countermeasure
B) benefits of a countermeasure
C) costs of a countermeasure
D) number of incidents of all possible countermeasures
سؤال
The ________ of the classic risk analysis calculation is the value of the thing to be protected.

A) asset value
B) annualized loss expectancy
C) exposure factor
D) countermeasure impact
سؤال
Discounted cash flow analysis is also called ________.

A) IRR
B) TCI
C) NPV
D) ROI
سؤال
Which of the following is NOT a logical possible response to risk by a company?

A) Risk reduction
B) Risk acceptance
C) Risk transference
D) Risk analysis
سؤال
Installing firewalls in a company is an example of ________.

A) risk reduction
B) risk acceptance
C) risk transference
D) risk avoidance
سؤال
The most common example of risk transference is ________.

A) insurance
B) no countermeasures
C) installing firewalls
D) IT security measures
سؤال
Return on investment analysis requires the computation of either the net present value or the ________.

A) risk transference
B) risk avoidance
C) internal rate of return
D) total cost of incident
سؤال
IT security planning always focuses on risk.
سؤال
The annualized loss expectancy of the classic risk analysis calculation is the yearly average loss expected from a compromise for the asset.
سؤال
Although IT security can reduce the risk of attacks for companies, security also has some negative side effects.
سؤال
The classic risk analysis calculation is difficult or impossible to use in actual practice.
سؤال
The worst problem with classic risk analysis is that it is rarely possible to estimate the annualized rate of occurrence for threats.
سؤال
ROI is typically quite easy to measure for security investments.
سؤال
A positive of classic risk analysis is that it imposes general discipline for thinking about risks and countermeasures.
سؤال
________ includes all of a firm's technical countermeasures and how they are organized into a complete system of protection.

A) Technical security architecture
B) Risk avoidance
C) Corporate security policy
D) Implementation guidance
سؤال
Technologies that a company has implemented in the past but that now are somewhat ineffective are known as ________.

A) central security management consoles
B) legacy security technologies
C) technical security architecture
D) defense in depth
سؤال
When an attacker has to break through multiple countermeasures to succeed, it's known as ________.

A) defense in depth
B) single point of vulnerability
C) weakest link
D) technical security architecture
سؤال
Which of the following defines the opposite of defense in depth?

A) Weakest link
B) Defense in depth
C) Single point of vulnerability
D) Technical security architecture
سؤال
________ refers to the intention to minimize lost productivity and attempt to not slow innovation.

A) Minimizing security burdens
B) Defining the weakest link
C) A single point of vulnerability
D) Technical security architecture
سؤال
________ is being able to manage security technologies from a single security management console or at least from a relatively few consoles.

A) Technical security architecture
B) A single point of vulnerability
C) Centralized security management
D) Defense in depth
سؤال
It is preferable if a firm's security systems evolve naturally and organically without major coordination.
سؤال
If a legacy technology is a serious threat to security, it must be replaced.
سؤال
In defense in depth, there are multiple independent countermeasures placed in a series.
سؤال
All single points of failure can be eliminated.
سؤال
Firewalls are only for borders between external networks and internal networks and do not exist for solely an internal purpose.
سؤال
In interorganizational systems, two companies link some of their IT assets.
سؤال
The goal of ________ is to emphasize a firm's commitment to strong security.

A) corporate security policies
B) centralized security management
C) technical security architecture
D) acceptable use policies
سؤال
It is common for companies to require users to read and sign a(n) ________.

A) corporate security policy
B) personally identifiable information policy
C) e-mail policy
D) acceptable use policy
سؤال
________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.

A) Standards
B) Policies
C) Guidelines
D) Procedures
سؤال
________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.

A) Standards
B) Policies
C) Guidelines
D) Procedures
سؤال
Of the following, ________ are the most detailed.

A) policies
B) standards
C) guidelines
D) procedures
سؤال
In the ________, a specific, full act should require two or more people to complete.

A) implementation guidance
B) weakest link
C) segregation of duties
D) request/authorization control
سؤال
________ describe the details of what is to be done but without specifically describing how to do something.

A) Baselines
B) Standards
C) Best practices
D) Procedures
سؤال
________ can simply be described as a person's system of values.

A) Baselines
B) Ethics
C) Procedures
D) Best practices
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/105
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Planning and Policy
1
Which of the following is FALSE about security management?

A) Management is abstract; technology is visible.
B) Security technology is far more important than security management.
C) There are fewer general principles in security management than technology.
D) It is generally a mistake to focus too heavily on security technology compared to security management.
Security technology is far more important than security management.
2
Comprehensive security pertains to ________.

A) closing all routes of attack to their systems to attackers
B) closing all Internet-linked servers to attackers
C) lessening security issues in an entire company
D) decreasing the risk of all computer systems in a company
closing all routes of attack to their systems to attackers
3
If a failure of a single element of a system will ruin security, this is called a(n) ________.

A) weakest-link failure
B) hybrid solution
C) internal audit
D) risk analysis
weakest-link failure
4
Process pertains to ________.

A) the plan-protect-respond cycle
B) the systems life cycle
C) a planned series of actions
D) recovery according to plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT part of the highest-level security management process that most firms use today to protect against threats?

A) Plan
B) Process
C) Protect
D) Respond
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
6
The systems development life cycle is most connected to the ________ of the plan-protect-respond cycle of security management.

A) plan
B) process
C) protect
D) respond
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
7
Response is ________.

A) the second phase of the systems life cycle
B) the plan-based creation and operation of countermeasures
C) a planned series of actions
D) recovery according to plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
8
A firm's primary objective is to make a profit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
9
A firewall administrator should check the log file in a company each week.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
10
One reason why security management is difficult is that companies need to protect a large number of resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
11
Security is too complicated to be managed informally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
12
In the plan-protect-respond cycle, the three activities always take place in sequential order.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
13
One key to making security an enabler is to get security involved near the end of most projects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following produced the greatest change in financial reporting requirement since the Great Depression?

A) The Sarbanes-Oxley Act
B) The General Data Protection Regulation
C) The Gramm-Leach-Bliley Act
D) The Health Insurance Portability and Accountability Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Sarbanes-Oxley Act was passed in ________.

A) 2000
B) 2002
C) 2010
D) 2012
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is an EU privacy law?

A) The Sarbanes-Oxley Act
B) The General Data Protection Regulation
C) The Gramm-Leach-Bliley Act
D) The Health Insurance Portability and Accountability Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is also known as the Financial Services Modernization Act?

A) GDPR
B) GLBA
C) HIPAA
D) SB 1386
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following was the first data breach notification law in the U.S.?

A) GDPR
B) GLBA
C) HIPAA
D) SB 1386
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ was the last state to implement a data breach notification law in ________.

A) Georgia; 2000
B) Alabama; 2018
C) North Dakota; 2016
D) California; 2018
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
20
One of the first data breach notification laws in the U.S. was created in ________.

A) California
B) New York
C) Illinois
D) Texas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
21
Who has the power to prosecute companies that fail to take reasonable precautions to protect private information?

A) HIPAA
B) FTC
C) GDPR
D) GLBA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ has set the standards for companies that accept credit cards as a form of payment.

A) FISMA
B) FTC
C) PCI-DSS
D) HIPAA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
23
Why was FISMA enacted?

A) To set standards for companies that accept credit card payments
B) To set accreditation standards for members of a particular industry
C) To prosecute firms that fail to take reasonable precautions to protect customers' private information
D) To bolster computer and network security within the federal government
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
24
Compliance laws create requirements to which corporate security must respond.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Sarbanes-Oxley Act was passed in 2012.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
26
Given the importance of Sarbanes-Oxley compliance for companies, most firms were forced to increase their security efforts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
27
The GLBA is considered the most important EU privacy rule ever created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
28
There are strong federal laws requiring companies to provide notice of a data breach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
29
HIPAA has the power to require firms to pay to be audited annually by an external firm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
30
The first stage of FISMA is a certification of a system by an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is considered the first step for a corporation in managing security?

A) To decide where the security function will sit on a firm's organization chart
B) To determine what devices need secured and which software to use to do that
C) To determine the size of the security staff and the budget that will support that staff
D) To decide the objectives of the security function
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is considered a fundamental problem with making IT security a staff department outside IT?

A) Separation reduces accountability.
B) IT security would report to a firm's CIO.
C) Security changes that would need to be made would be easier.
D) Security and IT could share many of the same technological skill set.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is NOT one of the three auditing departments that are part of most corporations?

A) Financial auditing
B) Internal auditing
C) Outside auditing
D) IT auditing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
34
________ in regard to outside IT security means checking out closely the IT security implications of a potential partnership before beginning the relationship.

A) A hybrid solution
B) Internal auditing
C) Risk analysis
D) Due diligence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
35
The most common type of IT security outsourcing is done for ________.

A) laptops
B) e-mail
C) all hardware
D) all software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
36
An advantage to using an MSSP is ________.

A) cost
B) control of employees
C) constant internal control
D) independence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
37
The usual title for a company's security department head is chief security officer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
38
Most analysts recommend placing security outside IT.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
39
Most firms have a CSO report direct to the company's CEO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
40
The financial auditing department examines organizational units for efficiency, effectiveness, and adequate controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
41
IT security is almost always mistrusted by other departments because of security's potential to make life harder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following compares probable losses with the costs of security protections?

A) Weakest-link failure
B) Reasonable risk
C) Internal audits
D) Risk analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
43
The ________ of the classic risk analysis calculation is the percentage of an asset's value that would be lost in a breach.

A) single loss expectancy
B) annualized loss expectancy
C) exposure factor
D) countermeasure impact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
44
What does a central logging server of an MSSP on a network do?

A) It calculates the amount of processing ability needed for a system.
B) It uploads a firm's event log data.
C) It uploads the number of times that employees have logged into-or attempted to log into-questionable sites.
D) It automatically creates a firewall when questionable activity is detected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following is an outsourcing alternative?

A) PCI-DSS
B) FISMA
C) MSSP
D) ISO 27000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
46
In the classic risk analysis calculation, once you know how much damage an incident may cause from a single breach, the next issue is how frequently breaches will occur. This is normally done on a(n) ________ basis.

A) annualized
B) weekly
C) daily
D) bi-annual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
47
In the classic risk analysis calculation, the countermeasure impact assesses the ________.

A) drawbacks of a countermeasure
B) benefits of a countermeasure
C) costs of a countermeasure
D) number of incidents of all possible countermeasures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
48
The ________ of the classic risk analysis calculation is the value of the thing to be protected.

A) asset value
B) annualized loss expectancy
C) exposure factor
D) countermeasure impact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discounted cash flow analysis is also called ________.

A) IRR
B) TCI
C) NPV
D) ROI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is NOT a logical possible response to risk by a company?

A) Risk reduction
B) Risk acceptance
C) Risk transference
D) Risk analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
51
Installing firewalls in a company is an example of ________.

A) risk reduction
B) risk acceptance
C) risk transference
D) risk avoidance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
52
The most common example of risk transference is ________.

A) insurance
B) no countermeasures
C) installing firewalls
D) IT security measures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
53
Return on investment analysis requires the computation of either the net present value or the ________.

A) risk transference
B) risk avoidance
C) internal rate of return
D) total cost of incident
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
54
IT security planning always focuses on risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
55
The annualized loss expectancy of the classic risk analysis calculation is the yearly average loss expected from a compromise for the asset.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
56
Although IT security can reduce the risk of attacks for companies, security also has some negative side effects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
57
The classic risk analysis calculation is difficult or impossible to use in actual practice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
58
The worst problem with classic risk analysis is that it is rarely possible to estimate the annualized rate of occurrence for threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
59
ROI is typically quite easy to measure for security investments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
60
A positive of classic risk analysis is that it imposes general discipline for thinking about risks and countermeasures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
61
________ includes all of a firm's technical countermeasures and how they are organized into a complete system of protection.

A) Technical security architecture
B) Risk avoidance
C) Corporate security policy
D) Implementation guidance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
62
Technologies that a company has implemented in the past but that now are somewhat ineffective are known as ________.

A) central security management consoles
B) legacy security technologies
C) technical security architecture
D) defense in depth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
63
When an attacker has to break through multiple countermeasures to succeed, it's known as ________.

A) defense in depth
B) single point of vulnerability
C) weakest link
D) technical security architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following defines the opposite of defense in depth?

A) Weakest link
B) Defense in depth
C) Single point of vulnerability
D) Technical security architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
65
________ refers to the intention to minimize lost productivity and attempt to not slow innovation.

A) Minimizing security burdens
B) Defining the weakest link
C) A single point of vulnerability
D) Technical security architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
66
________ is being able to manage security technologies from a single security management console or at least from a relatively few consoles.

A) Technical security architecture
B) A single point of vulnerability
C) Centralized security management
D) Defense in depth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
67
It is preferable if a firm's security systems evolve naturally and organically without major coordination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
68
If a legacy technology is a serious threat to security, it must be replaced.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
69
In defense in depth, there are multiple independent countermeasures placed in a series.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
70
All single points of failure can be eliminated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
71
Firewalls are only for borders between external networks and internal networks and do not exist for solely an internal purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
72
In interorganizational systems, two companies link some of their IT assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
73
The goal of ________ is to emphasize a firm's commitment to strong security.

A) corporate security policies
B) centralized security management
C) technical security architecture
D) acceptable use policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
74
It is common for companies to require users to read and sign a(n) ________.

A) corporate security policy
B) personally identifiable information policy
C) e-mail policy
D) acceptable use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
75
________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.

A) Standards
B) Policies
C) Guidelines
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
76
________ are mandatory implementation guidance, meaning that employees are not free to opt out of them.

A) Standards
B) Policies
C) Guidelines
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
77
Of the following, ________ are the most detailed.

A) policies
B) standards
C) guidelines
D) procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
78
In the ________, a specific, full act should require two or more people to complete.

A) implementation guidance
B) weakest link
C) segregation of duties
D) request/authorization control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
79
________ describe the details of what is to be done but without specifically describing how to do something.

A) Baselines
B) Standards
C) Best practices
D) Procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
80
________ can simply be described as a person's system of values.

A) Baselines
B) Ethics
C) Procedures
D) Best practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 105 في هذه المجموعة.