Example of a preventive control

Assignment Help Operation Management
Reference no: EM132676959

A firewall can be an example of a preventive control. True  A vulnerabilityrisk True

  •  False

 is a a human caused or natural event that could impact the system, whereas a  is a weakness in the system that can be exploited.

  •  False

A regional bank at which you are preforming a security assessment has placed a remote access server outside the firewall to provide a front-end for remote employees. This is an example of a ________________.

  • Bastion Host
  • Demilitarized Zone
  • Proxy Server
  • Intrusion Detection System (IDS)

An organization has opened a new office in a somewhat risky neighborhood. The office manager installs a CCTV system to monitor the perimeter and main entrance 24 hours a day. This an example of a _____________ control.

  • Preventive
  • Detective
  • Administrative
  • Corrective

The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart device in the end user's physical possession and any device accessed by the end user, such as a smartphone, laptop, workstation, or mobile device.

  • Workstation
  • User
  • WAN
  • System/Application

Your organization has recently adopted a policy that requires monthly ssecurity training for all users. What type of control does this represent?

  • Physical
  • Technical
  • Compensatory
  • Administrative/Procedural

Your organization requires the use of a RSA token as well as a username and password to connect to the network remotely. This an example of what type of Authentication mechanism?

  • Biometric
  • Two-factor
  • Single-factor
  • Token

The elements of Information Assurance are Confidentiality, Integrity, Availability, Authentication, and what?

  • Nonrepudiation
  • Encryption
  • Compliance
  • Authorization

Integrity ensures that only authorized individuals have access to data.

  •  True
  •  False 

Availability ensures information is available to authorized users and devices. Initially, the information owner must determine availability requirements. The owner must determine who needs access to the data and when.

  •  True
  •  False  

___________________ is the act of protecting information and the systems that store and process it.

  • Risk Assessment
  • Policy Framework
  • Information Systems Security
  • Change Mangement  

It is important for leaders in information systems security to:

  • Demonstrate ethical behavior.
  • Require ethical behavior from employees.
  • Recognize and work with various personality types.
  • Work with others to gain support for and adherence to security policies.
  • All of the above.

Refer back to question 13. The most difficult and time consuming step of policy implementation is also the last step. What step is that?

  • Anchor the Changes in Corporate Culture
  • Assemble a Powerful Coliation
  • Communicate the Vision
  • Create Urgency

What defines how an organization performs and conducts business functions and transactions with a desired outcome?

  • Policy
  • Standards
  • Procedures
  • Guidelines
  • All of the above

The first step in incident response takes its name from a medical term and is the art of rapidly assessing how severe an incident is. Which is the correct term?

  • Analysis
  • OpSec
  • Containment
  • Triage

A firewall can be an example of a technical control.

  •  True
  •  False

Reference no: EM132676959

Questions Cloud

Prepare journal entries for Whispering Company : Prepare journal entries for Whispering Company to (a) record the transactions related to these bonds in 2020
Find average requirements during lead time : For this item we desire a 88 percent service level. What are our average requirements during lead time? (Number only, no units)
What are two conditions for internal measure to be effective : To monitor companies' performance, they are using some Performance Measures. Explain Financial Measure, External Measure and Internal Measure based on Operation
Determine the amount of impairment loss : Presented below are two independent cases related to available-for-sale debt investments. Determine the amount of impairment loss
Example of a preventive control : A firewall can be an example of a preventive control. True A vulnerabilityrisk True
Stakeholders and interrelationships : Describe how the activities influenced your awareness and understanding of the interrelationship between business and society.
Compare e-mart and a convenience store : Compare E-mart and a convenience store like 7-Eleven in terms of the product attributes that customers expect
How long does a car spend in the drive- through line : Assume that no car that enters the line leaves without service. On average, how long does a car spend in the drive- through line?
Perform the analysis for making a pizza : Perform the following analysis for making a pizza: Draw a process map. Identify inputs, transformation, outputs, and value created.

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd