Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 12: Information Security Maintenance
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
CM assists in
streamlining
change management processes and prevents changes that could detrimentally affect the security posture of a system before they happen. _________________________
Question 22
True/False
For configuration management (CM) and control, it is important to
document
the proposed or actual changes in the system security plan. _________________________
Question 23
True/False
Rehearsal adds value by exercising the procedures, identifying shortcomings, and providing security personnel the opportunity to improve the security plan before it is needed.
Question 24
True/False
An affidavit is sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place.
Question 25
True/False
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep approach-initiation, analysis, design, implementation, and
use
. _________________________
Question 26
True/False
Threats cannot be removed without requiring a repair of the vulnerability.
Question 27
True/False
The basic function of the external monitoring process is to monitor activity, report results, and escalate
warnings
. _________________________
Question 28
True/False
A
maintenance
ticket is opened when a user calls about an issue. _________________________
Question 29
True/False
CERT stands for "computer emergency
recovery
team." _________________________
Question 30
True/False
In some instances, risk is acknowledged as being part of an organization's business process.
Question 31
True/False
The NIST SP 800-100 Information Security Handbook provides
technical
guidance for the establishment and implementation of an information security program. _________________________
Question 32
True/False
Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.
Question 33
True/False
Specific
routine
bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization. _________________________
Question 34
True/False
Policy needs to be reviewed and refreshed from time to time to ensure that it's providing a current foundation for the information security program.
Question 35
True/False
When setting a policy about whether to pursue attacks against its systems, organizations must choose from three approaches.
Question 36
True/False
In some organizations,
facilities
management is the identification, inventory, and documentation of the current information system's status-hardware, software, and networking configurations. _________________________