Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 2
Quiz 12: Information Security Maintenance
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 41
True/False
Organizations should have a carefully planned and fully populated inventory of all their network devices, communication channels, and computing devices. _________________________
Question 42
True/False
The simplest part of an investigation is analyzing a copy or image for potential evidentiary material. __________
Question 43
True/False
The internal vulnerability assessment is usually performed against every device that is exposed to the Internet, using every possible penetration testing approach. _________________________
Question 44
True/False
The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand. _________________________
Question 45
True/False
A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________
Question 46
True/False
A chain of custody is the detailed documentation of the collection, storage, transfer, and ownership of evidence from the crime scene through its presentation in court. ___________
Question 47
True/False
An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked. _________________________
Question 48
True/False
To be put to the most effective use, the information that comes from the IDPS must be integrated into the inventory process. _________________________
Question 49
True/False
The best method of remediation in most cases is to repair a vulnerability. _________________________
Question 50
Multiple Choice
A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle.
Question 51
True/False
You can document the results of the verification of a vulnerability by saving the results in what is called a(n) profile. _________________________
Question 52
Multiple Choice
__________ are a component of the security triple.
Question 53
Multiple Choice
A __________ is the recorded condition of a particular revision of a software or hardware configuration item.
Question 54
True/False
The final process in the vulnerability assessment and remediation domain is the exit phase. _________________________
Question 55
True/False
An affidavit is used as permission to search for evidentiary material at a specified location and/or to seize items to return to an investigator's lab for examination after being signed by an approving authority. _____________
Question 56
True/False
When possible, major incident response plan elements should be rehearsed. _________________________
Question 57
True/False
In digital forensic investigations for information security, most operations focus on policies-documents that provide managerial guidance for ongoing implementation and operations. ____________
Question 58
True/False
WLAN stands for "wide local area network." _________________________
Question 59
True/False
The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all the organization's networks, information systems, and information security defenses. _________________________