Saint COm510 midterm exam

Question # 00031578 Posted By: shortone Updated on: 11/11/2014 03:36 PM Due on: 11/25/2014
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image


Question 1. 1. The process that develops, creates, and implements strategies for the accomplishment of objectives is called ____. (Points : 5)





Question 2. 2. ____ implements and oversees the use of controls to reduce risk. (Points : 5)





Question 3. 3. Which of the following is an advantage of the user support group form of training? (Points : 5)





Question 4. 4. Which of the following is the first step in the process of implementing training? (Points : 5)





Question 5. 5. ____ occurs when a control provides proof that a user possesses the identity that he or she claims. (Points : 5)





Question 6. 6. According to the C.I.A. triangle, the three desirable characteristics of information are confidentiality, integrity, and ____. (Points : 5)





Question 7. 7. Which of the following is a definite indicator of an actual incident? (Points : 5)





Question 8. 8. Which of the following certifications is considered among the most prestigious for security managers? (Points : 5)





Question 9. 9. The COSO framework component ____, based on the establishment of objectives, assists in the identification and examination of valid risks to objectives as well as information. (Points : 5)





Question 10. 10. A medium-sized organization has ____. (Points : 5)





Question 11. 11. The ____ component of an EISP defines the organizational structure designed to support information security within the organization. (Points : 5)





Question 12. 12. The IRP is usually activated ____. (Points : 5)





Question 13. 13. ____ is the process of measuring against established standards. (Points : 5)





Question 14. 14. ____ is the quality or state of being whole, complete, and uncorrupted. (Points : 5)





Question 15. 15. Very large organizations have ____ computers. (Points : 5)





Question 16. 16. A(n) ____ is a detailed description of the activities that occur during an attack. (Points : 5)





Question 17. 17. Identification is typically performed by means of a(n) ____. (Points : 5)





Question 18. 18. The COSO framework component ____ includes the policies and procedures to support management directives. (Points : 5)





Question 19. 19. Defining the scope of an ISMS is part of which phase of the BS7799 Part 2 Plan-Do-Check-Act cycle? (Points : 5)





Question 20. 20. A(n) ____ security policy provides detailed, targeted guidance to instruct all members of the organization in the use of technology-based systems. (Points : 5)





Question 21. 21. Internal ISMS audits are conducted during the ____ phase of the Plan-Do-Check-Act cycle. (Points : 5)





Question 22. 22. ____ control tools evaluate the efficiency and effectiveness of business processes. (Points : 5)





Question 23. 23. Which of the following is a disadvantage of user support groups? (Points : 5)





Question 24. 24. Corrective or preventive action is taken during the ____ phase of the Plan-Do-Check-Act cycle. (Points : 5)





Question 25. 25. To ensure ____, an organization must demonstrate that it is continuously attempting to meet the requirements of the market in which it operates. (Points : 5)





Question 26. 26. When users call an organization with problems with their computers, the network, or an Internet connection, they speak with the ____. (Points : 5)





Question 27. 27. Communications security involves the protection of an organization's ____. (Points : 5)





Question 28. 28. ____ evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness. (Points : 5)





Question 29. 29. A risk assessment is performed during the ____ phase of the SecSDLC. (Points : 5)





Question 30. 30. An identified weakness of a controlled system is known as a ____. (Points : 5)





Question 31. 31. Which of the following is NOT a question you should ask when considering best practices for your organization? (Points : 5)





Question 32. 32. Best business practices are also known as ____. (Points : 5)





Question 33. 33. The ____ layer of the bull's-eye model consists of computers used as servers, desktop computers, and systems used for process control and manufacturing systems. (Points : 5)





Question 34. 34. A ____ is a value or profile of a performance metric against which changes in the performance metric can be usefully compared. (Points : 5)





Question 35. 35. Which of the following is true about a hot site? (Points : 5)





Question 36. 36. The DRP is usually managed by the ____. (Points : 5)





Question 37. 37. Operational plans are used by ____. (Points : 5)





Question 38. 38. A SDLC-based project that is the result of a carefully developed strategy is said to be ____. (Points : 5)





Question 39. 39. A disadvantage of creating a number of independent ISSP documents is that the result may ____. (Points : 5)





Question 40. 40. A joint application development team can survive employee turnover by ____. (Points : 5)



Dot Image
Tutorials for this Question
  1. Tutorial # 00030961 Posted By: shortone Posted on: 11/11/2014 03:37 PM
    Puchased By: 4
    Tutorial Preview
    The solution of Saint COm510 midterm exam...
    Attachments
    Saint_COm510_midterm_exam.docx (344.5 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    da...tie Rating Round-the-clock assistance by the tutors 04/28/2015
    w...ly Rating Take care of presentation of work 04/27/2015

Great! We have found the solution of this question!

Whatsapp Lisa