Saint COm510 midterm exam

Question # 00752299 Posted By: mac123 Updated on: 02/26/2020 04:30 AM Due on: 02/26/2020
Subject Communications Topic Advertising Tutorials:
Question
Dot Image

Saint COm510 midterm exam 24608

•            

Question 1. 1. The process that develops, creates, and implements strategies for the accomplishment of objectives is called ____. (Points : 5)

  leading

 

  controlling

 

  organizing

 

  planning

 

 

Question 2. 2. ____ implements and oversees the use of controls to reduce risk. (Points : 5)

  Risk assessment

 

  Incident response

 

  Risk management

 

  Network security administration

 

 

Question 3. 3. Which of the following is an advantage of the user support group form of training? (Points : 5)

  usually conducted in an informal social setting

 

  formal training plan

 

  can be live, or can be archived and viewed at the trainee's convenience

 

  can be customized to the needs of the trainee

 

 

Question 4. 4. Which of the following is the first step in the process of implementing training? (Points : 5)

  identify training staff

 

  identify target audiences

 

  identify program scope, goals, and objectives

 

  motivate management and employees

 

 

Question 5. 5. ____ occurs when a control provides proof that a user possesses the identity that he or she claims. (Points : 5)

  Identification

 

  Authentication

 

  Authorization

 

  Accountability

 

 

Question 6. 6. According to the C.I.A. triangle, the three desirable characteristics of information are confidentiality, integrity, and ____. (Points : 5)

  accountability

 

  availability

 

  authorization

 

  authentication

 

 

Question 7. 7. Which of the following is a definite indicator of an actual incident? (Points : 5)

  unusual system crashes

 

  reported attack

 

  presence of new accounts

 

  use of dormant accounts

 

 

Question 8. 8. Which of the following certifications is considered among the most prestigious for security managers? (Points : 5)

  CISSP

 

  CISA

 

  GIAC

 

  Security +

 

 

Question 9. 9. The COSO framework component ____, based on the establishment of objectives, assists in the identification and examination of valid risks to objectives as well as information. (Points : 5)

  Control environment

 

  Risk assessment

 

  Control activities

 

  Information management

 

 

Question 10. 10. A medium-sized organization has ____. (Points : 5)

  a larger security staff than a small organization

 

  a larger security budget than a small organization

 

  1,000 to 10,000 computers

 

  larger security needs than a small organization

 

 

Question 11. 11. The ____ component of an EISP defines the organizational structure designed to support information security within the organization. (Points : 5)

  Information Technology Security Responsibilities and Roles

 

  Need for Information Technology Security

 

  Reference to Other Information Technology Standards and Guidelines

 

  Information Technology Security Elements

 

 

Question 12. 12. The IRP is usually activated ____. (Points : 5)

  before an incident takes place

 

  when an incident is detected

 

  once the DRP is activated

 

  once the BCP is activated

 

 

Question 13. 13. ____ is the process of measuring against established standards. (Points : 5)

  Baselining

 

  Benchmarking

 

  Targeting

 

  Profiling

 

 

Question 14. 14. ____ is the quality or state of being whole, complete, and uncorrupted. (Points : 5)

  Integrity

 

  Authorization

 

  Security

 

  Confidentiality

 

 

Question 15. 15. Very large organizations have ____ computers. (Points : 5)

  100 to 1,000

 

  1,000 to 5,000

 

  10,000 to 50,000

 

  more than 10,000

 

 

Question 16. 16. A(n) ____ is a detailed description of the activities that occur during an attack. (Points : 5)

  attack roster

 

  attack profile

 

  attack message

 

  attack diagnostic

 

 

Question 17. 17. Identification is typically performed by means of a(n) ____. (Points : 5)

  audit log

 

  user name

 

  cryptographic certificate

 

  access control list

 

 

Question 18. 18. The COSO framework component ____ includes the policies and procedures to support management directives. (Points : 5)

  Control environment

 

  Risk assessment

 

  Control activities

 

  Information management

 

 

Question 19. 19. Defining the scope of an ISMS is part of which phase of the BS7799 Part 2 Plan-Do-Check-Act cycle? (Points : 5)

  Plan

 

  Do

 

  Check

 

  Act

 

 

Question 20. 20. A(n) ____ security policy provides detailed, targeted guidance to instruct all members of the organization in the use of technology-based systems. (Points : 5)

 

  issue-specific

 

  enterprise information

 

  system-specific

 

  information

 

 

Question 21. 21. Internal ISMS audits are conducted during the ____ phase of the Plan-Do-Check-Act cycle. (Points : 5)

  Plan

 

  Do

 

  Check

 

  Act

 

 

Question 22. 22. ____ control tools evaluate the efficiency and effectiveness of business processes. (Points : 5)

  Financial

 

  Behavioral

 

  Information

 

  Operational

 

 

Question 23. 23. Which of the following is a disadvantage of user support groups? (Points : 5)

  relatively inflexible

 

  resource intensive, to the point of being inefficient

 

  centered on a specific topic or product

 

  software can be very expensive

 

 

Question 24. 24. Corrective or preventive action is taken during the ____ phase of the Plan-Do-Check-Act cycle. (Points : 5)

  Plan

 

  Do

 

  Check

 

  Act

 

 

Question 25. 25. To ensure ____, an organization must demonstrate that it is continuously attempting to meet the requirements of the market in which it operates. (Points : 5)

  policy administration

 

  due diligence

 

  adequate security measures

 

  certification and accreditation

 

 

Question 26. 26. When users call an organization with problems with their computers, the network, or an Internet connection, they speak with the ____. (Points : 5)

  security officers

 

  help desk personnel

 

  security staffers

 

  security consultants

 

 

Question 27. 27. Communications security involves the protection of an organization's ____. (Points : 5)

  employees

 

  physical assets

 

  technology

 

  data network devices

 

 

Question 28. 28. ____ evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness. (Points : 5)

  Systems testing

 

  Risk assessment

 

  Incident response

 

  Planning

 

 

Question 29. 29. A risk assessment is performed during the ____ phase of the SecSDLC. (Points : 5)

  implementation

 

  analysis

 

  design

 

  investigation

 

 

Question 30. 30. An identified weakness of a controlled system is known as a ____. (Points : 5)

  liability

 

  threat

 

  vulnerability

 

  fault

 

 

Question 31. 31. Which of the following is NOT a question you should ask when considering best practices for your organization? (Points : 5)

  Do you have a similar customer base as the target?

 

  Is your organization structure similar to the target?

 

  Do you face similar challenges as the target?

 

  Are you in a similar industry as the target?

 

 

Question 32. 32. Best business practices are also known as ____. (Points : 5)

  recommended practices

 

  universal practices

 

  industry practices

 

  best models

 

 

Question 33. 33. The ____ layer of the bull's-eye model consists of computers used as servers, desktop computers, and systems used for process control and manufacturing systems. (Points : 5)

  Policies

 

  Networks

 

  Applications

 

  Systems

 

 

Question 34. 34. A ____ is a value or profile of a performance metric against which changes in the performance metric can be usefully compared. (Points : 5)

  target

 

  framework

 

  benchmark

 

  baseline

 

 

Question 35. 35. Which of the following is true about a hot site? (Points : 5)

  It is an empty room with standard heating, air conditioning, and electrical service.

 

  It includes computing equipment and peripherals with servers but not client workstations.

 

  It duplicates computing resources, peripherals, phone systems, applications, and workstations.

 

  All communications services must be installed after the site is occupied.

 

 

Question 36. 36. The DRP is usually managed by the ____. (Points : 5)

  CEO

 

  CIO

 

  CISO

 

  IT community of interest

 

 

Question 37. 37. Operational plans are used by ____. (Points : 5)

  managers

 

  security managers

 

  the CISO

 

  the CIO

 

 

Question 38. 38. A SDLC-based project that is the result of a carefully developed strategy is said to be ____. (Points : 5)

  employee-driven

 

  plan-driven

 

  sequence-driven

 

  event-driven

 

 

Question 39. 39. A disadvantage of creating a number of independent ISSP documents is that the result may ____. (Points : 5)

  overgeneralize the issues

 

  suffer from poor policy dissemination

 

  skip over vulnerabilities

 

  be written by those with less complete subject matter expertise

 

 

 

 

Question 40. 40. A joint application development team can survive employee turnover by ____. (Points : 5)

  having as few employees in the team as possible

 

  having as many employees in the team as possible

 

  documenting the processes and procedures used by the team

 

  having all the members work independently

 

 

Dot Image
Tutorials for this Question
  1. Tutorial # 00750852 Posted By: mac123 Posted on: 02/26/2020 04:31 AM
    Puchased By: 2
    Tutorial Preview
    The solution of Saint COm510 midterm exam...
    Attachments
    docx_-_2020-02-26T095818_822.docx (171.88 KB)

Great! We have found the solution of this question!

Whatsapp Lisa