Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH5

  • Question 1

    1 out of 1 points
    Host-based IDSs are usually installed on the machines they protect to monitor the status of various files stored on those machines.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 2

    2 out of 2 points
    The security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
    Selected Answer:
    Correct 
    framework
    Correct Answer:
    Correct framework
  • Question 3

    1 out of 1 points
    Failure to incorporate the organization’s mission, vision, and culture in the development of an information security system practically guarantees the failure of the information security program.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 4

    1 out of 1 points
    A standard is a plan or course of action used to convey instructions from an organization’s senior-most management to those who make decisions, take actions, and perform other duties.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 5

    2 out of 2 points
    ____ controls set the direction and scope of the security process, and provide detailed instructions for its conduct, as well as addressing the design and implementation of the security planning process.
    Selected Answer:
    Correct 
    Managerial
    Correct Answer:
    Correct Managerial
  • Question 6

    2 out of 2 points
    A(n) __________ often functions as a standard or procedure to be used when configuring or maintaining systems, such as a network firewall.
    Selected Answer:
    Correct 
    Systems-Specific Policy
    Correct Answer:
    Correct Systems-Specific Policy
  • Question 7

    2 out of 2 points
    A(n) __________ addresses specific areas of technology such as electronic mail, use of the Internet, etc. and require frequent updates.
    Selected Answer:
    Correct 
    Issue-Specific Security Policy
    Correct Answer:
    Correct Issue-Specific Security Policy
  • Question 8

    2 out of 2 points
    Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.
    Selected Answer:
    Correct 
    assessment
    Correct Answer:
    Correct assessment
  • Question 9

    2 out of 2 points
    ____ controls are the tactical implementations of security in the organization and include logical access controls, such as authentication, authorization, and cryptography.
    Selected Answer:
    Correct 
    Technical
    Correct Answer:
    Correct Technical
  • Question 10

    2 out of 2 points
    A buffer against outside attacks, a no-man’s-land between the inside and outside networks, is frequently referred to as a(n) ____.
    Selected Answer:
    Correct 
    DMZ
    Correct Answer:
    Correct DMZ
  • Question 11

    1 out of 1 points
    A cold site provides many of the same services and options of the hot site.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 12

    1 out of 1 points
    Information security safeguards can be grouped into two levels of control; managerial, and remedial.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 13

    2 out of 2 points
    ____ controls are management and lower-level planning functions that deal with issues such as disaster recovery and incident response planning, personnel security, physical security, and the protection of production inputs and outputs.
    Selected Answer:
    Correct 
    Operational
    Correct Answer:
    Correct Operational
  • Question 14

    2 out of 2 points
    A(n) __________ is an executive-level document that shapes the philosophy of security in the IT environment.
    Selected Answer:
    Correct 
    Enterprise Information Security Policy
    Correct Answer:
    Correct Enterprise Information Security Policy
  • Question 15

    2 out of 2 points
    ____-based IDSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.
    Selected Answer:
    Correct 
    Network
    Correct Answer:
    Correct Network

No comments:

Post a Comment