Deck 15: IT Security Controls, Plans, and Procedures

ملء الشاشة (f)
exit full mode
سؤال
Operational controls range from simple to complex measures that worktogether to secure critical and sensitive data, information, and IT systems functions.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
All controls are applicable to all technologies.
سؤال
The IT security management process ends with the implementation ofcontrols and the training of personnel.
سؤال
An IT security ________ helps to reduce risks.

A) control
B) safeguard
C) countermeasure
D) all of the above
سؤال
_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

A) Configuration management control
B) IT security management
C) Detection and recovery control
D) Security compliance
سؤال
Detection and recovery controls provide a means to restore lostcomputing resources.
سؤال
The implementation phase comprises not only the directimplementation of the controls, but also the associated training and general security awareness programs for the organization.
سؤال
_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.

A) Preventative
B) Supportive
C) Operational
D) Detection and recovery
سؤال
It is likely that the organization will not have the resources toimplement all the recommended controls.
سؤال
To ensure that a suitable level of security is maintained, managementmust follow up the implementation with an evaluation of the effectiveness of the security controls.
سؤال
Water damage protection is included in security controls.
سؤال
Physical access or environmental controls are only relevant to areashousing the relevant equipment.
سؤال
The recommended controls need to be compatible with theorganization's systems and policies.
سؤال
The selection of recommended controls is not guided by legalrequirements.
سؤال
Controls may vary in size and complexity in relation to theorganization employing them.
سؤال
_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.

A) Management
B) Technical
C) Preventative
D) Supportive
سؤال
Once in place controls cannot be adjusted, regardless of the results ofrisk assessment of systems in the organization.
سؤال
________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.

A) Technical
B) Preventative
C) Detection and recovery
D) Management
سؤال
Management controls refer to issues that management needs to address.
سؤال
Appropriate security awareness training for all personnel in anorganization, along with specific training relating to particular systems and controls, is an essential component in implementing controls.
سؤال
Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process.

A) management
B) security awareness and training
C) maintenance
D) all of the above
سؤال
The implementation process is typically monitored by the organizational ______.

A) security officer
B) general counsel
C) technology officer
D) human resources
سؤال
An IT security plan should include details of _________.

A) risks
B) recommended controls
C) responsible personnel
D) all of the above
سؤال
Identification and authentication is part of the _______ class of security controls.

A) technical
B) operational
C) management
D) none of the above
سؤال
The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.

A) access
B) asset management
C) compliance
D) business continuity management
سؤال
________ is a means of managing risk, including policies, procedures, guidelines, practices, or organizational structures.
سؤال
The _______ plan documents what needs to be done for each selected control, along with the personnel responsible, and the resources and time frame to be used.
سؤال
_______ management is the process used to review proposed changes to systems for implications on the organization's systems and use.
سؤال
_______ management is concerned with specifically keeping track of the configuration of each system in use and the changes made to each.
سؤال
The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.
سؤال
Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.

A) cost analysis
B) cost-benefit analysis
C) benefit analysis
D) none of the above
سؤال
The follow-up stage of the management process includes _________.

A) maintenance of security controls
B) security compliance checking
C) incident handling
D) all of the above
سؤال
A _________ on an organization's IT systems identifies areas needing treatment.
سؤال
Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks.

A) security compliance
B) maintenance
C) incident handling
D) program management
سؤال
A contingency plan for systems critical to a large organization would be _________ than that for a small business.

A) smaller, less detailed
B) larger, less detailed
C) larger, more detailed
D) smaller, more detailed
سؤال
______ checking is an audit process to review the organization's security processes.
سؤال
________ controls involve the correct use of hardware and software security capabilities in systems.
سؤال
The three steps for IT security management controls and implementation are: prioritize risks, respond to risks, and __________ .
سؤال
The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

A) asset management
B) business continuity management
C) information security incident management
D) physical and environmental security
سؤال
When the implementation is successfully completed, _______ needs to authorize the system for operational use.
سؤال
Contingency planning falls into the _________ class of security controls.
سؤال
Controls can be classified as belonging to one of the following classes: management controls, operational controls, technical controls, detection and recovery controls, preventative controls, and _______ controls.
سؤال
The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically, often as part of a wider, general audit of the organization or whenever changes are made to the organization's security policy.
سؤال
_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
سؤال
Incident response is part of the ________ class of security controls.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: IT Security Controls, Plans, and Procedures
1
Operational controls range from simple to complex measures that worktogether to secure critical and sensitive data, information, and IT systems functions.
False
2
All controls are applicable to all technologies.
False
3
The IT security management process ends with the implementation ofcontrols and the training of personnel.
False
4
An IT security ________ helps to reduce risks.

A) control
B) safeguard
C) countermeasure
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

A) Configuration management control
B) IT security management
C) Detection and recovery control
D) Security compliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
Detection and recovery controls provide a means to restore lostcomputing resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
The implementation phase comprises not only the directimplementation of the controls, but also the associated training and general security awareness programs for the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.

A) Preventative
B) Supportive
C) Operational
D) Detection and recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
It is likely that the organization will not have the resources toimplement all the recommended controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
To ensure that a suitable level of security is maintained, managementmust follow up the implementation with an evaluation of the effectiveness of the security controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Water damage protection is included in security controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
Physical access or environmental controls are only relevant to areashousing the relevant equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The recommended controls need to be compatible with theorganization's systems and policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
The selection of recommended controls is not guided by legalrequirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Controls may vary in size and complexity in relation to theorganization employing them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.

A) Management
B) Technical
C) Preventative
D) Supportive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Once in place controls cannot be adjusted, regardless of the results ofrisk assessment of systems in the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.

A) Technical
B) Preventative
C) Detection and recovery
D) Management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Management controls refer to issues that management needs to address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Appropriate security awareness training for all personnel in anorganization, along with specific training relating to particular systems and controls, is an essential component in implementing controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process.

A) management
B) security awareness and training
C) maintenance
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
The implementation process is typically monitored by the organizational ______.

A) security officer
B) general counsel
C) technology officer
D) human resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
An IT security plan should include details of _________.

A) risks
B) recommended controls
C) responsible personnel
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
Identification and authentication is part of the _______ class of security controls.

A) technical
B) operational
C) management
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.

A) access
B) asset management
C) compliance
D) business continuity management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ is a means of managing risk, including policies, procedures, guidelines, practices, or organizational structures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
The _______ plan documents what needs to be done for each selected control, along with the personnel responsible, and the resources and time frame to be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
_______ management is the process used to review proposed changes to systems for implications on the organization's systems and use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
_______ management is concerned with specifically keeping track of the configuration of each system in use and the changes made to each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.

A) cost analysis
B) cost-benefit analysis
C) benefit analysis
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The follow-up stage of the management process includes _________.

A) maintenance of security controls
B) security compliance checking
C) incident handling
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
A _________ on an organization's IT systems identifies areas needing treatment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks.

A) security compliance
B) maintenance
C) incident handling
D) program management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
A contingency plan for systems critical to a large organization would be _________ than that for a small business.

A) smaller, less detailed
B) larger, less detailed
C) larger, more detailed
D) smaller, more detailed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
______ checking is an audit process to review the organization's security processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
________ controls involve the correct use of hardware and software security capabilities in systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The three steps for IT security management controls and implementation are: prioritize risks, respond to risks, and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

A) asset management
B) business continuity management
C) information security incident management
D) physical and environmental security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
When the implementation is successfully completed, _______ needs to authorize the system for operational use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
Contingency planning falls into the _________ class of security controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
Controls can be classified as belonging to one of the following classes: management controls, operational controls, technical controls, detection and recovery controls, preventative controls, and _______ controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically, often as part of a wider, general audit of the organization or whenever changes are made to the organization's security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
Incident response is part of the ________ class of security controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.