Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 2
Quiz 12: Information Security Maintenance
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
True/False
The target selection step of Internet vulnerability assessment involves using the external monitoring intelligence to configure a test engine (such as Nessus) for the tests to be performed.
Question 2
True/False
The internal monitoring domain is the component of the maintenance model that focuses on identifying, assessing, and managing the physical security of assets in an organization.
Question 3
True/False
Documenting information system changes and assessing their potential impact on system security is an important and consequential part of digital forensics.
Question 4
True/False
US-CERT is generally viewed as the definitive authority for computer emergency response teams.
Question 5
True/False
An effective information security governance program requires no ongoing review once it is well established.
Question 6
True/False
Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, using software such as Wireshark.
Question 7
True/False
An intranet vulnerability scan starts with the scan of the organization's default Internet search engine.
Question 8
True/False
External monitoring entails collecting intelligence from various data sources and then giving that intelligence context and meaning for use by decision makers within the organization.
Question 9
True/False
Over time, policies and procedures may become inadequate due to changes in the organization's mission and operational requirements, threats, or the environment.
Question 10
True/False
Over time, external monitoring processes should capture information about the external environment in a format that can be referenced across the organization as threats emerge and for historical use.
Question 11
True/False
A general guideline for performance of hard drives suggests that when the amount of data stored on a particular hard drive averages 95% of available capacity for a prolonged period, you should consider an upgrade for the drive.
Question 12
True/False
Intelligence for external monitoring can come from a number of sources: vendors, CERT organizations, public network sources, and membership sites.
Question 13
True/False
Documentation procedures are not required for configuration and change management processes.
Question 14
True/False
Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality, and should be highly accurate and updated each time there is a change.