To ensure that a suitable level of security is maintained

Assignment Help Basic Computer Science
Reference no: EM13986233

Assurance is the process of examining a computer product or system with respect to certain criteria.

2. Problems with providing strong computer security involve only the design phase.

3. IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.

4. To ensure that a suitable level of security is maintained, management must follow up the implementation with an evaluation of the effectiveness of the security controls.

MULTIPLE CHOICES QUESTIONS

5.      __________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A.  Availability        C.  System Integrity

B.  Privacy              D.  Data Integrity

Answer

6.      Security classes are referred to as __________.

A.     security clearances         B.  security classifications

C.      security levels              D.  security properties

Answer

7.      __________ ensures that critical assets are sufficiently protected in a cost-effective manner.

A.  IT control                    B.  IT security management

C.  IT discipline                 D.  IT risk implementations

Answer

8.      The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A.   risk register                   B. corporate security policy

c.   vulnerability source        D. threat assessment

Answer

9.      Which of the following supports the Defense-in-depth strategy?

A.  Abstraction            B. Data Hiding

C   Layering               D. Encryption

Answer

10.  The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.

A.    Access

B.     Asset management

C.     Compliance

D.    Business continuity management

Answer

11.  Which of the following is not a security architecture framework?

A.    Sherwood Applied  Business Security Architecture (SABSA)

B.     NIST Special publication 800-53

C.     ISO 27001 & 27002

D.    Open Web Application Security Project (OWASP)

Answer

12.  Which security management is considered complimentary to ISO/27001 & 20072

A.    SABA

B.     COBIT

C.     NIST Special publication 800-53

D.    OWASP

Answer

13.  The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

A.    asset management

B.     business continuity management

C.     information security incident management

D.    physical and environmental security

Answer 

FILL-IN THE BLANK QUESTIONS

14. A loss of _________ is the disruption of access to or use of information or an information system.

Answer

15.  A subject is said to have a security _________ of a given level.

Answer

16.  ISO details a model process for managing information security that comprises the following steps:  plan, do, ________, and act.

Answer

17.  A _________ on an organization's IT systems identifies areas needing treatment.

Answer: Risk Assessment

Answer Table

True/False

Answer

1

 

2

 

3

 

4

 

Multiple Choices

 

5

 

6

 

7

 

8

 

9

 

10

 

11

 

12

 

13

 

Short Answer

 

14

 

15

 

16

 

17

 

 SHORT ANSWER QUESTIONS

18.  Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

Answer:

19.  The necessity of the "no read up" rule for a multilevel security is fairly obvious. What is the importance of the "no write down" rule?

 Answer

20.  List and briefly define the five alternatives for treating identified risks.

Answer:

Reference no: EM13986233

Questions Cloud

What mass of ore did the crane add to the cart : Objects A and B each have mass m. Each is traveling at speed v and in the opposite direction from the other object. As explained by the law of conservation of momentum, which event could not occur after the two objects collide?
Determine the distance separating the red and violet light : Determine the distance separating the red and violet light as it emerges from the glass. How does the angle of refraction into glass at the air-glass interface compare to the angle of incidence in glass at the glass-air interface?
How many oxygen atoms are there in 0.25 mole of co32- : How many oxygen atoms are there in 0.25 mole of CO32-?
Explain order of operations and why it is necessary : The reason that addition step was done before final division step because the addition operation was contained within the parentheses which needs to be solved before any step.
To ensure that a suitable level of security is maintained : IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.
What is the wavelength resolution for the spectrometer : Treat the plasma diameter as equal to the spot size generated by the laser - The actual diameter of the plasma is related to the incident field power and approaches the spot diameter as the power of the incident field is increase several times over..
Read the article and research the peace model : For this assignment, read the article below and research the PEACE model. In 500 words, tell me what the model is, where it originated, and how it is better than the John Reid technique of interrogations
Discuss one real-life criminal case : Discuss one (1) real-life criminal case, taken from current events, and identify the court that took jurisdiction. Explain why the court that took the case was the appropriate one for the particular circumstances
Crime theory and the white-collar offender : Which theory best describes your view of this white collar offender. Support your position with at least three (3) external references. Assignment checked for plagiarism through SafeAssign

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What windows server 2012 edition is best?

What Windows Server 2012 edition is best?

  Define average or mean

In numerical analysis the average and standard deviation is often calculated

  What strategies appeal most to you summarize your ideas

Research recruiting and retention strategies at three different companies. What distinguishes one company from another in this area?

  Identify the number of days

Identify the number of days

  Dealership is moving into a newly built facility in a suburb

America One Car (AOC) dealership is moving into a newly built facility in a suburb town of Washington, D.C.. You are retained as a consultant by AOC dealership to design a network solution for their new location. The new facility is assumed to..

  Convert to base hex-octal-decimal and binary

Convert to base hex, octal, decimal and binary the Mayan number J7GE.I8H (do all the mathematics in decimal).

  Resolve this problem within wireless technology

You can resolve this issue by wiring but you do not want to do that. What can you do to resolve this problem within wireless technology?

  Research the internet for recent cases near your region

research the internet for recent cases near your region that used digital or computer evidence as a source of

  What does station b send back to station a

Your company wants to create a wireless network for the entire office building. The building is 10 stories high, and the company wants to incorporate IEEE 802.11a by placing one access point on the tenth floor. Will this layout work? Explain.

  Cryptographic and network security

Using the two keys (memory words) cryptographic and network security, encrypt the following message: "Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distrustful bring two friends."

  Develop framework for it steering committee explaining roles

Develop a framework for the IT steering committee, explaining the roles and responsibilities of the members.

  Problem regarding the aes and des

Use the Internet and / or Strayer Library to research the manner in which organizations regularly use the Advanced Encryption Standard (AES).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd