Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice
Quiz 14: It Security Management and Risk Assessment
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.
Question 22
Multiple Choice
Establishing security policy,objectives,processes and procedures is part of the ______ step.
Question 23
Short Answer
ISO details a model process for managing information security that comprises the following steps: plan,do,________,and act.
Question 24
Short Answer
_________ is a process used to achieve and maintain appropriate levels of confidentiality,integrity,availability,accountability,authenticity,and reliability.
Question 25
Multiple Choice
The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.
Question 26
Short Answer
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.
Question 27
Short Answer
A(n)_________ is anything that has value to the organization.
Question 28
Multiple Choice
A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.
Question 29
Short Answer
The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach,detailed risk analysis,combined approach,and __________ approach.
Question 30
Multiple Choice
________ specification indicates the impact on the organization should the particular threat in question actually eventuate.
Question 31
Short Answer
The term ________ refers to a document that details not only the overall security objectives and strategies,but also procedural policies that define acceptable behavior,expected practices,and responsibilities.