Management Information Security Chapter 5

6 March 2023
5 (221 reviews)
55 test answers

Unlock all answers in this set

Unlock answers (51)
question
Small organizations spend more per user on security than medium- and large-sized organizations. True False
answer
True
question
1. Small organizations spend more per user on security than medium- and large-sized organizations. a. True b. False
answer
True
question
2. Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments. a. True b. False
answer
False
question
3. Threats from insiders are more likely in a small organization than in a large one. a. True b. False
answer
False
question
4. The security education, training, and awareness (SETA) program is designed to reduce the occurence of external security attacks. a. True b. False
answer
False
question
5. On-the-job training can result in substandard work performance while the trainee gets up to speed. a. True b. False
answer
True
question
6. The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables. a. True b. False
answer
False
question
7. Planners need to estimate the effort required to complete each task, subtask, or action step. a. True b. False
answer
True
question
8. The work breakdown structure (WBS) can only be prepared with a complex specialized desktop PC application. a. True b. False
answer
False
question
9. A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________
answer
True
question
10. Each organization has to determine its own project management methodology for IT and information security projects. a. True b. False
answer
True
question
11. In the early stages of planning, the project planner should attempt to specify completion dates only for major employees within the project. _________________________
answer
False - milestones
question
12. Most information security projects require a trained project developer. _________________________
answer
False - manager
question
13. Which of the following variables is the most influential in determining how to structure an information security program? a. Security capital budget b. Organizational size c. Security personnel budget d. Organizational culture
answer
d
question
14. Which of the following is true about the security staffing, budget, and needs of a medium-sized organization? a. they have a larger security staff than a small organization b. they have a larger security budget (as percent of IT budget) than a small organization c. they have a smaller security budget (as percent of IT budget) than a large organization d. they have larger information security needs than a small organization
answer
d
question
15. Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk? a. Risk management b. Risk assessment c. Systems testing d. Vulnerability assessment
answer
b
question
16. Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness? a. Systems testing b. Risk assessment c. Incident response d. Systems security administration
answer
a
question
17. Which function needed to implement the information security program includes researching, creating, maintaining, and promoting information security plans? a. compliance b. policy c. planning d. systems security administration
answer
c
question
18. Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation? a. policy b. centralized authentication c. compliance/audit d. risk management
answer
b
question
19. Which of the following would be responsible for configuring firewalls and IDPSs, implementing security software, and diagnosing and troubleshooting problems? a. A security technician b. A security analyst c. A security consultant d. The security manager
answer
a
question
20. GGG security is commonly used to describe which aspect of security? a. technical b. software c. physical d. theoretical
answer
c
question
21. What is the SETA program designed to do? a. reduce the occurrence of external attacks b. improve operations c. reduce the occurence of accidental security breaches d. increase the efficiency of InfoSec staff
answer
c
question
22. A SETA program consists of three elements: security education, security training, and which of the following?. a. security accountability b. security authentication c. security awareness d. security authorization
answer
c
question
23. The purpose of SETA is to enhance security in all but which of the following ways? a. by building in-depth knowledge b. by adding barriers c. by developing skills d. by improving awareness
answer
b
question
24. Advanced technical training can be selected or developed based on which of the following? a. level of previous education b. level of previous training c. technology product d. number of employees
answer
c
question
25. Which of the following is the first step in the process of implementing training? a. Identify training staff b. Identify target audiences c. Identify program scope, goals, and objectives d. Motivate management and employees
answer
c
question
26. Which of the following is an advantage of the one-on-one method of training? a. Trainees can learn from each other b. Very cost-effective c. Customized d. Maximizes use of company resources
answer
c
question
27. Which of the following is a disadvantage of the one-on-one training method? a. Inflexible b. May not be responsive to the needs of all the trainees c. Content may not be customized to the needs of the organization d. Resource intensive, to the point of being inefficient
answer
d
question
28. Which of the following is an advantage of the formal class method of training? a. Personal b. Self-paced, can go as fast or as slow as the trainee needs c. Can be scheduled to fit the needs of the trainee d. Interaction with trainer is possible
answer
d
question
29. Which of the following is an advantage of the user support group form of training? a. Usually conducted in an informal social setting b. Formal training plan c. Can be live, or can be archived and viewed at the trainee's convenience d. Can be customized to the needs of the trainee
answer
a
question
31. __________ is a simple project management planning tool. a. RFP b. WBS c. ISO 17799 d. SDLC
answer
b
question
32. Which of the following is the most cost-effective method for disseminating security information and news to employees? a. distance learning seminars b. security-themed Web site c. conference calls d. security newsletter
answer
d
question
34. An organization's information security program refers to the entire set of activities, resources, personnel, and technologies used by an organization to manage the risks to the information _______ of the organization.
answer
assets
question
35. An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.
answer
assessment
question
36. A study of information security positions found that positions can be classified into one of three types: ____________________ are the real technical types, who create and install security solutions.
answer
builders
question
37. The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.
answer
consultant
question
38. The ____________________ program is designed to reduce the occurrence of accidental security breaches by members of the organization.
answer
security education, training, and awareness SETA
question
39. Project ____________________ is a description of a project's features, capabilities, functions, and quality level, used as the basis of a project plan.
answer
scope
question
40. A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on plan's the progress is complete.
answer
Milestone
question
41. The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________, needed to accomplish a task.
answer
resource
question
42. The three methods for selecting or developing advanced technical training are by job category, by job function, and by ____________________.
answer
technology product
question
43. The goal of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.
answer
awareness
question
44. ____________________ is a phenomenon in which the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project completion forecasts than in accomplishing meaningful project work.
answer
Projectitis
question
45. Explain the conflict between the goals and objectives of the CIO and the CISO.
answer
The CIO, as the executive in charge of the organization's technology, manages the efficiency in the processing and accessing of the organization's information. Anything that limits access or slows information processing directly contradicts the CIO's mission. On the other hand, the CISO functions more like an internal auditor, with the information security department examining existing systems to discover information security faults and flaws in technology, software, and employees' activities and processes. At times, these activities may disrupt the processing and accessing of the organization's information.
question
46. What is the security education, training, and awareness program? Describe how the program aims to enhance security.
answer
The security education, training, and awareness (SETA) program is designed to reduce the occurence of accidental security breaches by members of the organization. The program aims to enhance security in three ways: - By building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems - By developing skills and knowledge so that computer users can perform their jobs while using IT systems more securely - By improving awareness of the need to protect system resources
question
47. List the steps of the seven-step methodology for implementing training.
answer
The seven-step methodology for implementing training is as follows: Step 1: Identify program scope, goals, and objectives. Step 2: Identify training staff. Step 3: Identify target audiences. Step 4: Motivate management and employees. Step 5: Administer the program. Step 6: Maintain the program. Step 7: Evaluate the program.
question
48. What are some of the variables that determine how a given organization chooses to construct its InfoSec program?
answer
Among the variables that determine how a given organization chooses to structure its information security (InfoSec) program are organizational culture, size, security personnel budget, and security capital budget.
question
49. What are the four areas into which it is recommended to separate the functions of security?
answer
Functions performed by nontechnology business units outside the IT area of management control Functions performed by IT groups outside the InfoSec area of management control Functions performed within the InfoSec department as a customer service to the organization and its external partners Functions performed within the InfoSec department as a compliance enforcement obligation
question
50. Which security functions are normally performed by IT groups outside the InfoSec area of management control?
answer
Systems security administration Network security administration Centralized authentication
question
51. What are the components of the security program element described as preparing for contingencies and disasters?
answer
Business plan, identify resources, develop scenarios, develop strategies, test and revise plan.
question
52. What is the Chief Information Security Office primarily responsible for?
answer
The CISO is primarily responsible for the assessment, management, and implementation of the program that secures the organization's information.
question
53. What is the role of help desk personnel in the InfoSec team?
answer
An important part of the InfoSec team is the help desk, which enhances the security team's ability to identify potential problems. When a user calls the help desk with a complaint about his or her computer, the network, or an Internet connection, the user's problem may turn out to be related to a bigger problem, such as a hacker, a DoS attack, or a virus. Because help desk technicians perform a specialized role in InfoSec, they need specialized training. These staff members must be prepared to identify and diagnose both traditional technical problems and threats to InfoSec. Their ability to do so may cut precious hours off of an incident response.
question
54. What is the purpose of a security awareness program? What advantage does an awareness program have for the InfoSec program?
answer
A security awareness program keeps InfoSec at the forefront of users' minds on a daily basis. Awareness serves to instill a sense of responsibility and purpose in employees who handle and manage information, and it leads employees to care more about their work environment.
question
30. Which of the following is NOT a step in the process of implementing training? a. administer the program b. hire expert consultants c. motivate management and employees d. identify target audiences
answer
# b
question
33. Which of the following is true about a company's InfoSec awareness Web site? a. it should contain large images to maintain interest b. appearance doesn't matter if the information is there c. it should be placed on the Internet for public use d. it should be tested with multiple browsers
answer
# d