03(full).pdf
《03(full).pdf》由会员分享,可在线阅读,更多相关《03(full).pdf(9页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Within the context of the CBK,which of the following provides a MINIMUM level of security ACCEPTABLE for an environment?A baseline In a properly segregated environment,which of the following tasks is compatible with the task of security administrator?Quality assurance Within the realm of IT security
2、,which of the following combinations best defines risk?Threat coupled with a vulnerability Step-by-step instructions used to satisfy control requirements is called a:procedure Who should provide access authorization to computerized information?Data owner IT security measures should:Be tailored to me
3、et organizational security goals.What is the goal of the Maintenance phase in a common development process of a security policy?to review of the document on the specified review date Three key things that must be considered for the planning and implementation of access control mechanisms do NOT incl
4、ude:the systems vulnerability to viruses Which of the following best defines add-on security?Protection mechanisms implemented after an information system has become operational.Which of the following should NOT be addressed by employee termination practices?Employee bonding to protect against losse
5、s due to theft.Which of the following best allows risk management results to be used knowledgeably?An uncertainty analysis Why do many organizations require every employee to take a mandatory vacation of a week or more?To reduce the opportunity for an employee to commit an improper or illegal act.Re
6、lated to information security,the guarantee that the message sent is the message received is an example of which of the following?integrity What would be the Annualized Rate of Occurrence(ARO)of the threat user input error,in the case where a company employs 100 data entry clerks and every one of th
7、em makes one input error each month?1,200 What can be best defined as the examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment?Threat analysis Which of the following is not a responsibility of a database
8、 administrator?Providing access authorization to databases Which of the following would BEST be defined as an absence or weakness of safeguard that could be exploited?A vulnerability One of these statements about the key elements of a good configuration process is NOT true Controlling modifications
9、to system hardware in order to protect resource from changes A deviation from an organization-wide security policy requires which of the following?risk acceptance.What are the three FUNDAMENTAL principles of security?Confidentiality,integrity and availability Which of the following is most concerned
10、 with personnel security?Operational controls Preservation of confidentiality information systems requires that the information is not disclosed to:Unauthorized persons or processes.Who of the following is responsible for ensuring that proper controls are in place to address integrity,confidentialit
11、y,and availability of IT systems and data?System and information owners Which of the following should NOT be a role of the Security Administrator?Authorizing access rights Which of the following is not a component of a Operations Security triples?Risk Related to information security,integrity is the
12、 opposite of which of the following?alteration What can be described as a measure of the magnitude of loss or impact on the value of an asset?Exposure factor Ultimately,the security of computer-based information systems is which of the following?a management issue.Which of the following would best r
13、elate to resources being used only for intended purposes?Availability An effective information security policy should not have which of the following characteristic?Be designed with a short-to mid-term focus Which of the following would VIOLATE the Due Care concept?Data owners not laying out the fou
14、ndation of data protection Which of the following is NOT a part of a risk analysis?Choose the best countermeasure Related to information security,the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?Confidentiality Which of the following is
15、 not a goal of integrity?Prevention of the modification of information by authorized users.What is the main responsibility of information(data)owner?determining the data sensitivity or classification level What is opposite of the C.I.A.in risk management:disclosure,alteration,destruction Who is resp
16、onsible for initiating corrective actions when there are security violations?Management Which of the following is NOT a common integrity goal?Prevent paths that could lead to inappropriate disclosure.Which approach to a security program makes sure that the people actually responsible for protecting
17、the companys assets are DRIVING the program?The top-down approach Who should DECIDE how a company should approach security and what security measures should be implemented?Senior management What can best be defined as high-level statements,beliefs,goals and objectives?Policies How should a risk be H
18、ANDLED when the cost of the countermeasure OUTWEIGHS the cost of the risk?Accept the risk What is called a weakness or lack of a safeguard,which may be exploited by a threat,causing harm to the information systems or networks?Vulnerability Which of the following should be given technical security tr
19、aining?IT support personnel and system administrators How is Annualized Loss Expectancy(ALE)derived from a threat?SLE x ARO Which of the following is an advantage of a qualitative over a quantitative risk analysis?It prioritizes the risks and identifies areas for immediate improvement in addressing
20、the vulnerabilities.Which of the following statements pertaining to a security policy is incorrect?It specifies how hardware and software should be used throughout the organization.What is the main purpose of Corporate Security Policy?to communicate managements intentions in regards to information s
21、ecurity Which of the following is the weakest link in a security system?People Which of the following is not a responsibility of an information owner?Running regular backups and periodically testing the validity of the backup data.Computer security should be first and foremost which of the following
22、:Be cost-effective.Which one of the following individuals has PRIMARY responsibility for determining the classification level of information?Owner The control of communications test equipment should be clearly addressed by security policy for which of the following reasons?Test equipment can be used
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 03 full
限制150内