Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 4: Planning for Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________.
Question 62
Multiple Choice
_________ is the rapid determination of the scope of the breach in the confidentiality, integrity, and availability of information and information assets during or just following an incident.
Question 63
Multiple Choice
A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes __________.
Question 64
Multiple Choice
The spheres of security are the foundation of the security framework and illustrate how information is under attack from a variety of sources, with far fewer protection layers between the information and potential attackers on the __________ side of the organization.
Question 65
Multiple Choice
The transfer of large batches of data to an off-site facility, usually through leased lines or services, is called ____.
Question 66
Multiple Choice
A(n) _________ is a document containing contact information for the people to be notified in the event of an incident.
Question 67
Multiple Choice
A ____ site provides only rudimentary services and facilities.
Question 68
Multiple Choice
In early 2014, in response to Executive Order 13636, NIST published the Cybersecurity Framework, which intends to allow organizations to __________.
Question 69
Multiple Choice
__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
Question 70
Multiple Choice
The transfer of transaction data in real time to an off-site facility is called ____.
Question 71
Multiple Choice
________ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.
Question 72
Multiple Choice
Security __________ are the areas of trust within which users can freely communicate.
Question 73
Multiple Choice
_________ controls address personnel security, physical security, and the protection of production inputs and outputs.
Question 74
Multiple Choice
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ________.