Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 12: Information Security Maintenance
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
Each organization sets policy to choose one of two approaches when employing digital forensics. Select the statement that best identifies the options.
Question 82
Short Answer
Almost all aspects of a company's environment are ____________________, meaning threats that were originally assessed in the early stages of the project's systems development life cycle have probably changed and new priorities have emerged.
Question 83
Short Answer
The ____________________ tester's ultimate responsibility is to identify weaknesses in the security of the organization's systems and networks and then present findings to the system owners in a detailed report.
Question 84
Short Answer
A performance ____________________ is an expected level of performance against which all subsequent levels of performance are compared.
Question 85
Short Answer
Organizations should perform a(n) ____________________ assessment of their information security programs.
Question 86
Short Answer
The objective of the external ____________________ domain within the maintenance model is to provide early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks that the organization needs in order to mount an effective and timely defense.
Question 87
Multiple Choice
__________ allows for major security control components to be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.
Question 88
Multiple Choice
In digital forensics, all investigations follow the same basic methodology once permission for search and seizure has been obtained. Which of the following is NOT one of the elements of that process
Question 89
Short Answer
When an organization uses specific hardware and software products as part of its information security program, the ____________________ external intelligence source often provides either direct support or indirect tools that allow user communities to support each other.
Question 90
Short Answer
As the help desk personnel screen problems, they must also track the activities involved in resolving each complaint in a help desk ____________________ system.
Question 91
Short Answer
As each project nears , a(n) ____________________ risk assessment group reviews the impact of the project on the organization's risk profile.
Question 92
Short Answer
The process of collecting detailed information about devices in a network is often referred to as ____________________.
Question 93
Short Answer
A(n) ____________________ analysis is a procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segment (the baseline of systems and services).