最新安全习题讲解ppt课件.ppt





《最新安全习题讲解ppt课件.ppt》由会员分享,可在线阅读,更多相关《最新安全习题讲解ppt课件.ppt(54页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、安全管理习题讲解安全管理习题讲解每每时时每刻每刻 可信安全可信安全 QUIZ2 According to governmental data classification levels,how would answers to tests and health care information be classified?A ConfidentialB Sensitive but unclassifiedC Private D UnclassifiedB每每时时每刻每刻 可信安全可信安全每每时时每刻每刻 可信安全可信安全每每时时每刻每刻 可信安全可信安全每每时时每刻每刻 可信安全可信安全每每时
2、时每刻每刻 可信安全可信安全每每时时每刻每刻 可信安全可信安全每每时时每刻每刻 可信安全可信安全8 Which of the following is not a goal of integrity?A Prevention of the modification of information by unauthorized users.B Prevention of the unauthorized or unintentional modification of information by authorized users.C Prevention of the modification
3、 of information by authorized users.D Preservation of the internal and external consistency.C每每时时每刻每刻 可信安全可信安全9 Why do many organizations require every employee to take a mandatory vacation of a week or more?A To lead to greater productivity through a better quality of life for the employee.B To red
4、uce the opportunity for an employee to commit an improper or illegal act.C To provide proper cross training for another employee.D To allow more employees to have a better understanding of the overall system.B每每时时每刻每刻 可信安全可信安全10 Which of the following would best relate to resources being used only f
5、or intended purposes?A AvailabilityB IntegrityC ReliabilityD ConfidentialityA每每时时每刻每刻 可信安全可信安全11 Security of computer-based information systems is which of the following?A technical issue B management issue C training issue D operational issueB每每时时每刻每刻 可信安全可信安全12 Which of the following would be the
6、first step in establishing an information security program?A Development and implementation of an information security standards manual.B Development of a security awareness-training program for employees.C Purchase of security access control software.D Adoption of a corporate information security p
7、olicy statement.D每每时时每刻每刻 可信安全可信安全13 Which of the following tasks may be performed by the same person in a well-controlled information processing facility/computer center?A Computer operations and system development B System development and change management C System development and systems maintena
8、nce D Security administration and change managementC每每时时每刻每刻 可信安全可信安全14 Computer security should not:A Cover all identified risks.B Be cost-effective.C Be examined in both monetary and non-monetary terms.D Be proportionate to the value of IT systems.A每每时时每刻每刻 可信安全可信安全15 Which of the following is mos
9、t concerned with personnel security?A Management controls B Human resources controls C Technical controls D Operational controlsD每每时时每刻每刻 可信安全可信安全16 Which of the following is most likely given the responsibility of the maintenance and protection of the data?A Security administrator B User C Data cus
10、todian D Data owner C每每时时每刻每刻 可信安全可信安全17 Who is responsible for providing reports to the senior management on the effectiveness of the security controls?A Information systems security professionals B Data owners C Data custodians D Information systems auditorsD每每时时每刻每刻 可信安全可信安全18 Risk mitigation and
11、 risk reduction controls can be of which of the following types?A preventive,detective,or correctiveB Administrative,operational or logicalC detective,correctiveD preventive,corrective and administrativeA每每时时每刻每刻 可信安全可信安全19 Which of the following would best classify as a management control?A Review
12、of security controls B Documentation C Personnel security D Physical and environmental protectionA每每时时每刻每刻 可信安全可信安全20 What is the goal of the Maintenance phase in a common development process of a security policy?A to present document to approving body B to write proposal to management that states t
13、he objectives of the policy C publication within the organization D to review of the document on the specified review dateD每每时时每刻每刻 可信安全可信安全21 Which approach to a security program makes sure that the people actually responsible for protecting the companys assets are driving the program?A The top-dow
14、n approach B The bottom-up approach C The technology approach D The Delphi approachA每每时时每刻每刻 可信安全可信安全22 The preliminary steps to security planning include all of the following EXCEPT which of the following?A Determine alternate courses of action B Establish a security audit function.C Establish obje
15、ctives.D List planning assumptions.B每每时时每刻每刻 可信安全可信安全23IT security measures should:A Be tailored to meet organizational security goals.B Make sure that every asset of the organization is well protected.C Not be developed in a layered fashion.D Be complexA每每时时每刻每刻 可信安全可信安全24 Which of the following em
16、bodies all the detailed actions that personnel are required to follow?A Baselines B Procedures C Guidelines D StandardsB每每时时每刻每刻 可信安全可信安全25 Which of the following should NOT be addressed by employee termination practices?A Deletion of assigned logon-ID and passwords to prohibit system access.B Retur
17、n of access badges.C Employee bonding to protect against losses due to theft.D Removal of the employee from active payroll files.C每每时时每刻每刻 可信安全可信安全26 Preservation of confidentiality information systems requires that the information is not disclosed to:A Authorized persons and processes B Unauthorize
18、d persons.C Unauthorized persons or processes.D Authorized personC每每时时每刻每刻 可信安全可信安全27 Which of the following statements pertaining to quantitative risk analysis is false?A It requires a high volume of informationB It involves complex calculationsC It can be automatedD It involves a lot of guessworkD
19、每每时时每刻每刻 可信安全可信安全28 All except which of the follow are not used to ensure integrity?A compliance monitoring services B intrusion detection services C communications security management D firewall servicesA每每时时每刻每刻 可信安全可信安全29 Which of the following would violate the Due Care concept?A Latest security
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 最新 安全 习题 讲解 ppt 课件

限制150内