Deck 2: Planning for Security
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/123
العب
ملء الشاشة (f)
Deck 2: Planning for Security
1
In order to build programs suited to their needs,organizations should conduct an annual information security evaluation,the results of which the CISO should review with staff and then report to the board of directors.
False
2
A clearly directed strategy flows from top to bottom.
True
3
Benefits of Information Security Governance include optimization of the allocation of limited security safeguards.
False
4
Because it sets out general business intentions,a mission statement does not need to be concise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
5
A good general governance framework based on the IDEAL model includes initiating,developing,evaluating,acting and leading.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
6
Penetration testing is often conducted by consultants or outsourced contractors,who are commonly referred to as hackers,ninja teams or black teams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
7
Strategic planning has a more short-term focus than tactical planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
8
The primary goal of internal monitoring is to maintain an informed awareness of the state of all of the organization's networks,information systems,and information security defenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
9
The security governance responsibilities of mid-level managers in the organization includes implementing,auditing,enforcing and assessing compliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
10
A vision statement is meant to be a factual depiction of the current state of the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to the Information Technology Governance Institute (ITGI),information security governance includes all of the accountabilities and methods undertaken by the board of directors and executive management to provide strategic direction and establishment of objectives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
12
The success of information security plans can be enhanced by using a formal methodology like that of the systems development life cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
13
Vision statements should be ambitious.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
14
Boards of Directors for Information Security Governance should follow essential practices including identifying information security leaders,holding them accountable and ensuring support for them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
15
The CISO plays a more active role in the development of the planning details than does the CIO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
16
Information security governance consists of the leadership,organizational structures,and processes that safeguard information.Critical to the success of these structures and processes is effective interoperability between all parties,which requires constructive relationships,a common language,and shared commitment to addressing the issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
17
CISOs use the operational plan to organize,prioritize,and acquire resources for major projects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
18
The champion in a top-down approach to security implementation is usually a network administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
19
Implementation of information security can be accomplished only with a top-down approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
20
The basic outcomes of information security governance should include strategic alignment of information security with business strategy to support strategic planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
21
A bottom-up approach to information security implementation begins with
who see to improve the security of their systems._________________________
who see to improve the security of their systems._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
22
According to Information Security Roles and Responsibilities Made Easy,the Chief Information Security Officer must understand the fundamental
activities performed by the company and,based on this understanding,suggest appropriate information security solutions that uniquely protect these activities._________________________
activities performed by the company and,based on this understanding,suggest appropriate information security solutions that uniquely protect these activities._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
23
In order to build security programs suited to their needs,the CGTF recommends organizations conduct periodic testing and evaluation of the
of information security policies and procedures._________________________
of information security policies and procedures._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
24
Information security governance benefits include increased predictability and reduced uncertainty of
by lowering information-security-related risks to definable and acceptable levels _________________________
by lowering information-security-related risks to definable and acceptable levels _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
25
Some companies refer to
planning as intermediate planning._________________________
planning as intermediate planning._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
26
planning is the basis for the long-term direction taken by the organization._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
27
Organizations following the IDEAL Governance framework would determine where you are relative to where you want to be in the
phase._________________________
phase._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
28
plans are used to create tactical plans._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
29
Information security governance includes all of the accountabilities and methods undertaken by the board of directors and executive management to provide strategic direction,verification that
practices are appropriate,and validation that the organization's assets are used properly._________________________
practices are appropriate,and validation that the organization's assets are used properly._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
30
In a(n)
,a problem is solved based on a structured sequence of procedures._________________________
,a problem is solved based on a structured sequence of procedures._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
31
The
approach to security implementation might begin as a grass-roots effort in which systems administrators attempt to improve the security of their systems._________________________
approach to security implementation might begin as a grass-roots effort in which systems administrators attempt to improve the security of their systems._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
32
The information security governance framework generally includes a comprehensive security strategy explicitly linked with business and IT
._________________________
._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n)
is an identified weakness of a controlled information asset and is the result of absent or inadequate controls._________________________
is an identified weakness of a controlled information asset and is the result of absent or inadequate controls._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
34
Boards of directors should supervise strategic information security objectives by verifying that management's investment in information security is properly aligned with organizational strategies and the organization's
environment._________________________
environment._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
35
The impetus to begin a SDLC-based project may be either event-driven or
._________________________
._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
36
According to NACD,boards of directors should identify information security
,hold them accountable,and ensure support for them._________________________
,hold them accountable,and ensure support for them._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
37
The primary role of the chief
officer is to oversee overall "corporate security posture" for which he/she is accountable to the board._________________________
officer is to oversee overall "corporate security posture" for which he/she is accountable to the board._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
38
The basic outcomes of information security governance should include risk management by executing appropriate measures to manage and mitigate
to information resources._________________________
to information resources._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
39
The
of a business is like its identity card._________________________
of a business is like its identity card._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
40
The CISO is also known as the chief security officer,director of information
or information security manager._________________________
or information security manager._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
41
According to the Corporate Governance Task Force (CGTF),in order to build programs suited to their needs,organizations should do all but which of the following?
A) Create and execute a plan for punitive action for employees who fail to resolve information security deficiencies
B) Use security best practices guidance, such as ISO 17799, to measure information security performance
C) Establish plans, procedures, and tests to provide continuity of operations
D) Develop plans and initiate actions to provide adequate information security for networks, facilities, systems, and information
A) Create and execute a plan for punitive action for employees who fail to resolve information security deficiencies
B) Use security best practices guidance, such as ISO 17799, to measure information security performance
C) Establish plans, procedures, and tests to provide continuity of operations
D) Develop plans and initiate actions to provide adequate information security for networks, facilities, systems, and information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
42
Operational plans are used by ____.
A) managers
B) security managers
C) the CISO
D) the CIO
A) managers
B) security managers
C) the CISO
D) the CIO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
43
The basic outcomes of information security governance should include all but which of the following?
A) Value delivery by optimizing information security investments in support of organizational objectives
B) Performance measurement by measuring, monitoring, and reporting information security governance metrics to ensure that organizational objectives are achieved
C) Resource management by executing appropriate measures to manage and mitigate risks to information technologies
D) Resource management by utilizing information security knowledge and infrastructure efficiently and effectively
A) Value delivery by optimizing information security investments in support of organizational objectives
B) Performance measurement by measuring, monitoring, and reporting information security governance metrics to ensure that organizational objectives are achieved
C) Resource management by executing appropriate measures to manage and mitigate risks to information technologies
D) Resource management by utilizing information security knowledge and infrastructure efficiently and effectively
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
44
The National Association of Corporate Directors (NACD)recommends four essential practices for boards of directors.Which of the following is NOT one of these recommended practices?
A) Place information security at the top of the board's agenda
B) Assign information security to a key committee and ensure adequate support for that committee
C) Ensure the effectiveness of the corporation's information security policy through review and approval
D) Identify information security leaders, hold them accountable, and ensure support for them
A) Place information security at the top of the board's agenda
B) Assign information security to a key committee and ensure adequate support for that committee
C) Ensure the effectiveness of the corporation's information security policy through review and approval
D) Identify information security leaders, hold them accountable, and ensure support for them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
45
The ____ statement contains a formal set of organizational principles,standards,and qualities.
A) vision
B) mission
C) values
D) business
A) vision
B) mission
C) values
D) business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
46
The long-term direction taken by the organization is based on ____ planning.
A) strategic
B) tactical
C) operational
D) managerial
A) strategic
B) tactical
C) operational
D) managerial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
47
The information security governance framework generally consists of which of the following?
A) Security policies that address each aspect of strategy, control, and regulation
B) A security strategy that talks about the value of information technologies protected
C) Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk
D) All of these are components of the information security governance framework
A) Security policies that address each aspect of strategy, control, and regulation
B) A security strategy that talks about the value of information technologies protected
C) Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk
D) All of these are components of the information security governance framework
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is NOT a significant benefit of information security governance?
A) Optimization of the allocation of limited security resources
B) A level of assurance that critical decisions are not based on faulty information
C) Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels
D) All of these are benefits of information security governance
A) Optimization of the allocation of limited security resources
B) A level of assurance that critical decisions are not based on faulty information
C) Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels
D) All of these are benefits of information security governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
49
The ____ explicitly declares the business of the organization and its intended areas of operations.
A) vision statement
B) values statement
C) mission statement
D) business statement
A) vision statement
B) values statement
C) mission statement
D) business statement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
50
Budgeting,resource allocation,and manpower are critical components of the ____ plan.
A) strategic
B) operational
C) organizational
D) tactical
A) strategic
B) operational
C) organizational
D) tactical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
51
According to the Corporate Governance Task Force (CGTF),in order to build programs suited to their needs,organizations should do all but which of the following?
A) Conduct periodic testing and evaluation of the effectiveness of information security policies and procedures
B) Establish a security management structure to assign explicit individual roles, responsibilities, authority, and accountability
C) Conduct an annual information security evaluation, the results of which the CISO should review with security staff and then report to the board of directors
D) Implement policies and procedures based on risk assessments to secure information assets
A) Conduct periodic testing and evaluation of the effectiveness of information security policies and procedures
B) Establish a security management structure to assign explicit individual roles, responsibilities, authority, and accountability
C) Conduct an annual information security evaluation, the results of which the CISO should review with security staff and then report to the board of directors
D) Implement policies and procedures based on risk assessments to secure information assets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
52
Information security ____ must be addressed at the highest levels of an organization's management team in order to be effective and offer a sustainable approach.
A) objectives
B) plans
C) governance
D) practices
A) objectives
B) plans
C) governance
D) practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is true about mission statements?
A) They should be ambitious
B) They express what the organization is
C) They express the aspirations of the organization
D) They are not meant to be probable
A) They should be ambitious
B) They express what the organization is
C) They express the aspirations of the organization
D) They are not meant to be probable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
54
____ statements are meant to express the aspirations of the organization.
A) Mission
B) Vision
C) Values
D) Business
A) Mission
B) Vision
C) Values
D) Business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
55
Vision statements are meant to be ____.
A) probable
B) realistic
C) factual
D) ambitious
A) probable
B) realistic
C) factual
D) ambitious
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
56
According to the IGTI,Boards of directors should supervise strategic information security objectives by all but which of the following?
A) Inculcating a culture that recognizes the criticality of information and information security to the organization
B) Verifying that management's investment in information security is properly aligned with organizational budgets and the organization's financial environment
C) Assuring that a comprehensive information security program is developed and implemented
D) Demanding reports from the various layers of management on the information security program's effectiveness and adequacy
A) Inculcating a culture that recognizes the criticality of information and information security to the organization
B) Verifying that management's investment in information security is properly aligned with organizational budgets and the organization's financial environment
C) Assuring that a comprehensive information security program is developed and implemented
D) Demanding reports from the various layers of management on the information security program's effectiveness and adequacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
57
____ plans are used to organize the ongoing,day-to-day performance of tasks.
A) Strategic
B) Tactical
C) Organizational
D) Operational
A) Strategic
B) Tactical
C) Organizational
D) Operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
58
Tactical planning is also referred to as ____.
A) strategic planning
B) project planning
C) organizational planning
D) operational planning
A) strategic planning
B) project planning
C) organizational planning
D) operational planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is true?
A) Strategic plans are used to create tactical plans
B) Tactical plans are used to create strategic plans
C) Operational plans are used to create tactical plans
D) Operational plans are used to create strategic plans
A) Strategic plans are used to create tactical plans
B) Tactical plans are used to create strategic plans
C) Operational plans are used to create tactical plans
D) Operational plans are used to create strategic plans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
60
Tactical planning usually has a focus of ____.
A) one to five days
B) one to three months
C) one to three years
D) five or more years
A) one to five days
B) one to three months
C) one to three years
D) five or more years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
61
According to the Corporate Governance Task Force (CGTF),which phase in the IDEAL model and framework lays the groundwork for a successful improvement effort?
A) Initiating
B) Establishing
C) Acting
D) Learning
A) Initiating
B) Establishing
C) Acting
D) Learning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is an information security governance responsibility of the organization's employees?
A) Communicate policies and the program
B) Set security policy, procedures, programs and training for the organization
C) Brief the board, customers and the public
D) Implement policy, report security vulnerabilities and breaches
A) Communicate policies and the program
B) Set security policy, procedures, programs and training for the organization
C) Brief the board, customers and the public
D) Implement policy, report security vulnerabilities and breaches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
63
A ____ is a formal approach to solving a problem based on a structured sequence of procedures.
A) plan
B) methodology
C) program
D) control
A) plan
B) methodology
C) program
D) control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following is a characteristic of the bottom-up approach to security implementation?
A) Strong upper-management support
B) A clear planning and implementation process
C) Systems administrators attempting to improve the security of their systems
D) Ability to influence organizational culture
A) Strong upper-management support
B) A clear planning and implementation process
C) Systems administrators attempting to improve the security of their systems
D) Ability to influence organizational culture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
65
According to the Corporate Governance Task Force (CGTF),during which phase in the IDEAL model and framework does the organization plan the specifics of who it will reach its destination?
A) Initiating
B) Establishing
C) Acting
D) Learning
A) Initiating
B) Establishing
C) Acting
D) Learning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
66
According to the Corporate Governance Task Force (CGTF),during which phase in the IDEAL model and framework does the organization do the work according to the plan?
A) Initiating
B) Establishing
C) Acting
D) Learning
A) Initiating
B) Establishing
C) Acting
D) Learning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
67
A SDLC-based project may be started by an event-driven or a ____ impetus.
A) plan-driven
B) process-driven
C) sequence-driven
D) personnel-driven
A) plan-driven
B) process-driven
C) sequence-driven
D) personnel-driven
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
68
A(n)____ is a category of objects,persons or other entities that represent a constant threat to an asset.
A) threat
B) vulnerability
C) risk
D) exploit
A) threat
B) vulnerability
C) risk
D) exploit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
69
In the ____ phase of the security systems development life cycle (SecSDLC),the information obtained during the analysis phase is used to develop a proposed system-based solution for the business problem.
A) logical design
B) physical design
C) investigation
D) implementation
A) logical design
B) physical design
C) investigation
D) implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
70
At the end of the investigation phase of the security systems development life cycle (SecSDLC),a ____ analysis is performed.
A) effort-value
B) value
C) worthiness
D) feasibility
A) effort-value
B) value
C) worthiness
D) feasibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
71
According to the Corporate Governance Task Force (CGTF),during which phase in the IDEAL model and framework does the organization improve its ability to adopt new improvements in the future?
A) Initiating
B) Establishing
C) Acting
D) Learning
A) Initiating
B) Establishing
C) Acting
D) Learning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
72
In the security systems development life cycle (SecSDLC),the work products of each phase fall into the next phase to serve as its starting point,which is known as the ____ model.
A) continuous
B) cycle-based
C) circular
D) waterfall
A) continuous
B) cycle-based
C) circular
D) waterfall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
73
The ____ phase of the security systems development life cycle (SecSDLC)assesses the organization's readiness,its current systems status,and its capability to implement and then support the proposed systems.
A) physical design
B) implementation
C) investigation
D) analysis
A) physical design
B) implementation
C) investigation
D) analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
74
The first phase of the security systems development life cycle (SecSDLC)is the ____ phase.
A) analysis
B) investigation
C) logical design
D) physical design
A) analysis
B) investigation
C) logical design
D) physical design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
75
A SDLC-based project that is the result of a carefully developed strategy is said to be ____.
A) employee-driven
B) plan-driven
C) sequence-driven
D) event-driven
A) employee-driven
B) plan-driven
C) sequence-driven
D) event-driven
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
76
A(n)____ is a category of objects,persons or other entities that represent a constant threat to an asset.
A) threat
B) vulnerability
C) risk
D) exploit
A) threat
B) vulnerability
C) risk
D) exploit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is an nformation security governance responsibility of the CISO?
A) Communicate policies and the program
B) Set security policy, procedures, programs and training for the organization
C) Brief the board, customers and the public
D) Implement policy, report security vulnerabilities and breaches
A) Communicate policies and the program
B) Set security policy, procedures, programs and training for the organization
C) Brief the board, customers and the public
D) Implement policy, report security vulnerabilities and breaches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is an information security governance responsibility of the CEO?
A) Communicate policies and the program
B) Set security policy, procedures, programs and training for the organization
C) brief the board, customers and the public
D) implement policy, report security vulnerabilities and breaches
A) Communicate policies and the program
B) Set security policy, procedures, programs and training for the organization
C) brief the board, customers and the public
D) implement policy, report security vulnerabilities and breaches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
79
A(n)____ approach to security implementation is frequently referred to as a grass-roots effort.
A) SDLC
B) SecSDLC
C) top-down
D) bottom-up
A) SDLC
B) SecSDLC
C) top-down
D) bottom-up
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck
80
At the end of each phase of the security systems development life cycle (SecSDLC),a ____ takes place.
A) brainstorming session
B) structured discussion
C) structured review
D) planning session
A) brainstorming session
B) structured discussion
C) structured review
D) planning session
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 123 في هذه المجموعة.
فتح الحزمة
k this deck

