Principles of Information Security: Chapter 15

23 July 2023
4.9 (113 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
A collection of suggestions that should be implemented is referred to as a:
answer
Guideline
question
A written document that states how an organization plans to protect the company's information technology assets is a:
answer
Security policy
question
A written document that states how an organization plans to protect the company's information technology assets is a:
answer
Change management team
question
Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?
answer
Acceptable use policies
question
Select the option that best describes an asset:
answer
Any item that has a positive economic value
question
Select the option that best describes a policy:
answer
A document that outlines specific requirements or rules that must be met
question
Select the specific type of interview that is usually conducted when an employee leaves the company?
answer
Exit interview
question
Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of networks?
answer
Social media network
question
What can be defined as the planning, coordination, and communications functions that are needed to resolve an incident in an efficient manner?
answer
Incident handling
question
What control is designed to identify any threat that has reached the system?
answer
Detective control
question
What is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service?
answer
SLA
question
What is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization?
answer
Incident management
question
What kind of policy defines the actions users may perform while accessing systems and networking equipment?
answer
Acceptable use policy
question
What term best describes the ability to continue to function as the size or volume of the enterprise data center expands to meet the growing demands?
answer
Scalability
question
What term can be described as a function of threats, consequences of those threats, and the resulting vulnerabilities?
answer
Risk
question
What type of control is designed to provide an alternative to normal controls that for some reason cannot be used?
answer
Compensating control
question
What type of learner learns best through hands-on approaches?
answer
Kinesthetic
question
What type of learner tends to sit in the middle of the class and learns best through lectures and discussions?
answer
Auditory
question
What type of risk calculation uses an "educated guess" based on observation?
answer
Qualitative risk calculation
question
What type of threat is a threat related to the natural surroundings of an enterprise?
answer
Environmental threat
question
Which of the following is a basic measure of reliability for systems that cannot be repaired?
answer
Mean time to failure
question
Which of the following is a network that moves a product from the supplier to the customer and is comprised of vendors that supply raw material, manufacturers who convert the material into products, warehouses that store products, distribution centers that deliver them to the retailers, and retailers who bring the product to the consumer?
answer
Supply chain
question
Which term below describes the art of helping an adult learn?
answer
Andragogical
question
Which threat category affects the long-term goals of the organization?
answer
Strategic
question
Which threat category impacts the daily business of the organization?
answer
Operational