Question 1
Host-based IDSs are usually installed on the machines they protect to monitor the status of various files stored on those machines.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 2
The security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.Selected Answer: 
 frameworkCorrect Answer: 
 frameworkQuestion 3
Failure to incorporate the organization’s mission, vision, and culture in the development of an information security system practically guarantees the failure of the information security program.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 4
A standard is a plan or course of action used to convey instructions from an organization’s senior-most management to those who make decisions, take actions, and perform other duties.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 5
____ controls set the direction and scope of the security process, and provide detailed instructions for its conduct, as well as addressing the design and implementation of the security planning process.Selected Answer: 
 ManagerialCorrect Answer: 
 ManagerialQuestion 6
A(n) __________ often functions as a standard or procedure to be used when configuring or maintaining systems, such as a network firewall.Selected Answer: 
 Systems-Specific PolicyCorrect Answer: 
 Systems-Specific PolicyQuestion 7
A(n) __________ addresses specific areas of technology such as electronic mail, use of the Internet, etc. and require frequent updates.Selected Answer: 
 Issue-Specific Security PolicyCorrect Answer: 
 Issue-Specific Security PolicyQuestion 8
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.Selected Answer: 
 assessmentCorrect Answer: 
 assessmentQuestion 9
____ controls are the tactical implementations of security in the organization and include logical access controls, such as authentication, authorization, and cryptography.Selected Answer: 
 TechnicalCorrect Answer: 
 TechnicalQuestion 10
A buffer against outside attacks, a no-man’s-land between the inside and outside networks, is frequently referred to as a(n) ____.Selected Answer: 
 DMZCorrect Answer: 
 DMZQuestion 11
A cold site provides many of the same services and options of the hot site.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 12
Information security safeguards can be grouped into two levels of control; managerial, and remedial.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 13
____ controls are management and lower-level planning functions that deal with issues such as disaster recovery and incident response planning, personnel security, physical security, and the protection of production inputs and outputs.Selected Answer: 
 OperationalCorrect Answer: 
 OperationalQuestion 14
A(n) __________ is an executive-level document that shapes the philosophy of security in the IT environment.Selected Answer: 
 Enterprise Information Security PolicyCorrect Answer: 
 Enterprise Information Security PolicyQuestion 15
____-based IDSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.Selected Answer: 
 NetworkCorrect Answer: 
 Network
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH5
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment