Filters
Question type

Study Flashcards

The key components of the security perimeter include firewalls, DMZs (demilitarized zones), Web servers, and IDPSs. _________________________

A) True
B) False

Correct Answer

verifed

verified

Failure to develop an information security system based on the organization's mission, vision, and culture guarantees the failure of the information security program.

A) True
B) False

Correct Answer

verifed

verified

The spheres of security are the foundation of the security framework and illustrate how information is under attack from a variety of sources, with far fewer protection layers between the information and potential attackers on the __________ side of the organization.


A)  technology
B)  Internet 
C)  people
D)  operational

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A standard is a written instruction provided by management that informs employees and others in the workplace about proper behavior.

A) True
B) False

Correct Answer

verifed

verified

When BS 7799 first came out, several countries, including the United States, Germany, and Japan, refused to adopt it, claiming that it had fundamental problems. Which of the following is NOT one of those problems  


A)  The standard lacked the measurement precision associated with a technical standard. 
B)  It was not as complete as other frameworks. 
C)  The standard was hurriedly prepared, given the tremendous impact its adoption could have on industry information security controls. 
D)  The global information security community had already defined a justification for a code of practice, such as the one identified in ISO/IEC 17799.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

A(n) ____________________ is a scripted description of an incident-usually just enough information so that each individual knows what portion of the IRP to implement, and not enough to slow down the notification process.

Correct Answer

verifed

verified

The transfer of large batches of data to an off-site facility, usually through leased lines or services, is called ____.


A)  off-site storage
B)  remote journaling 
C)  electronic vaulting
D)  database shadowing

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The transfer of live transactions in real time to an off-site facility is called ____________________.

Correct Answer

verifed

verified

The security framework is a more detailed version of the security blueprint.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ is a detailed examination of the events that occurred from first detection to final recovery.

Correct Answer

verifed

verified

AAR
after-action rev...

View Answer

A(n) ____________________  directs members of an organization as to how issues should be addressed and how technologies should be used.

Correct Answer

verifed

verified

The operational plan documents the organization's intended long-term direction and efforts for the next several years. _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ backup is the storage of all files that have changed or been added since the last full backup.

Correct Answer

verifed

verified

A(n) ____________________ site is a fully configured computer facility with all services, communications links, and physical plant operations provided, including heating and air conditioning.

Correct Answer

verifed

verified

Each policy should contain procedures and a timetable for periodic review.

A) True
B) False

Correct Answer

verifed

verified

Guidelines are detailed statements of what must be done to comply with policy. _________________________

A) True
B) False

Correct Answer

verifed

verified

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.


A)  plan
B)  framework 
C)  model
D)  policy

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

A(n) ________ plan is a plan for the organization's intended strategic efforts over the next several years.


A)  standard
B)  operational 
C)  tactical
D)  strategic

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

NIST responded to a mandate and created a voluntary Risk Management Framework that provides an effective approachto manage cybersecurity risks. _________________________

A) True
B) False

Correct Answer

verifed

verified

The stated purpose of ISO/IEC 27002 is to offer guidelines and voluntary directions for information security management.  _________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 109

Related Exams

Show Answer