Planning for a co-location to continue business as usual in

Assignment Help Computer Engineering
Reference no: EM13462270

1: According to your textbook which of the following is NOT part of risk analysis:

  • Determine how likely each risk is to occur
  • Identify any risks to assets
  • Implement an acceptable use policy
  • Determine the value of assets

2: A risk is defined as:

  • A weakness in a system
  • A potential for exploit of a weakness in a system
  • The existence of a weakness in a system and the potential for an exploit
  • An attempted security attack

3: If a manager obtains insurance for damage to an asset, this is called risk transference:

  • True
  • False

4: Managers should declare financial statements about asset values:

  • True
  • False

5: A principle that a single person should not have authority to execute a critical task is called:

  • Access control
  • Separation of duties (or privileges)
  • Discretionary control
  • Confidentiality

6: Unauthorized alteration of information is a breach of:

  • Confidentiality
  • Integrity
  • Availability
  • Protocol

7: Of the two types of attackers, which has the potential to do the most damage?

  • Malicious Outsiders
  • Non-Malicious Insiders
  • Non-Malicious Outsiders
  •  Malicious Insiders

8: When controlling information such that only those who get the information are those who require it to do their job is called on a "need to know" basis:

  • True
  • False

9: Planning to have a "hot site" to restart operations in the case of a fatal incident is part of having a:

  • Risk Assessment Plan
  • Vulnerability Assessment Plan
  • Business Continuity Plan

10: Planning for a "co-location" to continue business as usual in the case of an incident that disrupts operations at one site is part of having a:

  • Risk Assessment Plan
  • Disaster Recovery Plan
  • Vulnerability Assessment Plan
  • Business Continuity Plan

11: SLE represents:

  • The proportion of assets that would be destroyed by a risk
  • Damage to an asset each time a risk would incur in a year
  • Number of times a risk may occur in a year
  • Damage to an asset incurred cumulatively for each year of the asset's lifetime

12: Privilege creep means:

  • An administrator gives him or herself the ability to examine private accounts
  • An attacker uses a rootkit to escalate privileges to execute system functions
  • When someone changes roles, they accrue both old and new privileges even if they are not needed
  • When a user logs in as a normal user, the executes an "su" to become a superuser

13: The four choices that managers have when managing risks are, (1) risk avoidance, (2) risk prosecution, (3) risk acceptance, (4) risk transference.

  • True
  • False

14: The encryption algorithm AES avoids security through obscurity:

  • True
  • False

15: A security policy is a written document only:

  • True
  • False

16: Even though very simplistic, security "checklists" such as the ISO 27000: 27001/27002 (17799) - also known as the ISO 27000 (or ISO27K) family of standards is useful for security auditing in preparation for or as part of a security certification:

  • True
  • False

17: Conducting background checks on employees is illegal in the United States:

  • True
  • False

18: Least privilege means allocating only the minimum set of privileges required to perform a job function:

  • True
  • False

Short Essay:

19: Give a brief explanation of the differences between risk assessment and risk management. Give as an example the name of at least one standard or framework that is used for each one:

20: Briefly describe what responsibilities managers have in terms of security. In this description, note that managers in this context are not security officers or officers of a company and do NOT have fiduciary responsibilities. In other words, what are minimum security standards managers must adhere to regardless of their position?

Reference no: EM13462270

Questions Cloud

When building a house a structured modular approach is : answer this question in 200 to 300 words. this is an it programing question1. when building a house a structured
Primary task responsenbspwithin the discussion board area : now that you have defined the quality dimensions you will need to determine which quality process improvement tools
Iproving processes and increasing efficiencies through it : using a company of your choice determine the strategic business goals. develop an it strategy that aligns to the
Web designers use cookies and session variables to : discuss how an object must be an expert on certain sets of information.nbspvisit a business online web presence.
Planning for a co-location to continue business as usual in : 1 according to your textbook which of the following is not part of risk analysisdetermine how likely each risk is to
Identifying and describing how specific system used in an : writenbspa 700- to 1050-word paper identifying and describing how specific system used in an organization has
Visit a businesss online web presence construct a list of : visit a businesss online web presence. construct a list of complex data types that would be needed to store all the
The end result of this course is developing a strategic : the end result of this course is developing a strategic audit. in this module you will outline and draft a
Information is data that is framed in a specific context in : information is data that is framed in a specific context. in this sense information is contextual data that has a level

Reviews

Write a Review

Computer Engineering Questions & Answers

  Progarm converts a number from roman numerals to decimal

Write down a program that converts a number from Roman numerals to decimal. It needs to consist of a class, romanType.

  Ehy the focus of the os is all over the place

Functionally, we'll definitely find that Unix or Linux will be the best choice for a web server as it doesn't require all of the "extras" for the graphics. What problems can we have if the focus of the OS is all over the place?

  What transform a network to a secure network

How do I transform a network to the secure network? What tools should I have and what kind of hardware do I need to have a basic secure network.

  Define a byte addressable main memory of 2^16 bytes

Given, a byte addressable main memory of 2^16 bytes and block size of 8 bytes, using direct mapped cache consisting of 32 lines.

  What are outputs and inputs to schedule control

What are the SMART criteria? What are the 5key points of using project milestones.

  Imagine you are the lead application developer for a

imagine you are the lead application developer for a commercial website development project at a midsized organization.

  How many words are required for physical memory

A system has a virtual memory space of 8 virtual pages for a process with 4 blocks per page and 8 words per block. The main memory consists of 8 page frames with 4 blocks per page and 8 words per block. How many words are required for physical mem..

  Validate the input begins with a series of characters

expalin how cookies can be used to store information on a computer and how the information can be retrieved by a PHP program. Assume that cookies are not disabled on the client.

  Do clear data from my maskedtextbox named "mtbpac"

I am using Visual Basic.NET with Microsoft Visual Studio 2005. I have a project with a User Control that I have created. I have a button that I named Clear. I require to clear the data from my maskedtextbox named "mtbPAC".

  Create a c++ output format statement

Create a C++ output format statement which would generate lines in the table which appear as shown below.

  Key elements of an entry strategy

Write down the key elements of an entry strategy, especially for the high-tech environment? The answer requires to be of at least 300 words. Also include any references

  Benefits of the two computer programmers

A multinational corporation transfers the foreign employee to the United States on a L-1 visa. The foreign employee is a computer programmer, working alongside an American computer programmer doing the equal  work.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd