Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Geology/Geography/Oceanography/Atmospheric Sciences
Study Set
Principles of Incident Response
Quiz 1: Contingency Planning Within Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A(n) ____ is a plan or course of action used by an organization to convey instructions from its senior-most management to those who make decisions,take actions,and perform other duties on behalf of the organization.
Question 22
Multiple Choice
Match each statement with an item below.
-The risk that remains to the information asset even after the existing control has been applied.
Question 23
Multiple Choice
Match each statement with an item below.
-The probability that a specific vulnerability within an organization will be successfully attacked.
Question 24
Multiple Choice
Match each statement with an item below.
-Segments of code that perform malicious actions.
Question 25
Short Answer
Information has the characteristic of ____________________ when disclosure or exposure to unauthorized individuals or systems is prevented.
Question 26
Multiple Choice
Match each statement with an item below.
-A person who uses and creates computer software to gain access to information illegally.
Question 27
Multiple Choice
Match each statement with an item below.
-Something that looks like a desirable program or tool,but that is in fact a malicious entity.
Question 28
Essay
____________________ is the process of applying controls to reduce the risks to an organization's data and information systems.
Question 29
Multiple Choice
A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organization.
Question 30
Essay
____________________ is the process of identifying vulnerabilities in an organization's information systems and taking carefully reasoned steps to ensure the confidentiality,integrity,and availability of all the components in the organization's information system.
Question 31
Multiple Choice
____ is the process of moving the organization toward its vision.
Question 32
Multiple Choice
A ____ deals with the preparation for and recovery from a disaster,whether natural or man-made.
Question 33
Multiple Choice
A(n) ____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality,integrity,or availability.
Question 34
Multiple Choice
Match each statement with an item below.
-Detailed statements of what must be done to comply with policy.
Question 35
Short Answer
For the purpose of relative risk assessment,____________________
equals
likelihood of vulnerability occurrence
times
value (or impact)
minus
percentage risk already controlled
plus
an element of uncertainty.
Question 36
Multiple Choice
Match each statement with an item below.
-The process used to identify and then control risks to an organization's information assets.
Question 37
Multiple Choice
Match each statement with an item below.
-A specific and identifiable instance of a general threat.
Question 38
Multiple Choice
Match each statement with an item below.
-Includes trade secrets,copyrights,trademarks,and patents.
Question 39
Essay
____________________ is defined by the Committee on National Security Systems (CNSS)as the protection of information and its critical elements,including the systems and hardware that use,store,and transmit that information.