Domains of a typical it infrastructure

Assignment Help Operation Management
Reference no: EM132677087

1) Which of the following statements is true regarding a security policy framework?

  • A framework should be considered static and should not be revised.
  • If written well from the outset, a framework and policies will not need to be revised.
  • A framework should be updated when you discover new or evolving risks.
  • Performing a gap analysis will not aid in the revision of a framework.

2) Overlapping policies

  • should be avoided.
  • is redundant and wastes valuable resources.
  • costs an organization too much money.
  • provides defense in depth.

3)In the lab, you aligned IT security policies throughout the seven domains of a typical IT infrastructure as part of a:

  • performance review.
  • layered security strategy.
  • security vulnerability analysis.
  • threat evaluation.

4) In the lab, you only provided a policy relevant to a risk, threat, or vulnerability of the seven domains of a typical IT infrastructure. However, normally a __________ would be the necessary next steps.

  • threat monitor or vulnerability monitor
  • risk assessment or suggested control
  • service agreement or user license
  • delegation table or authority chart

5) Using a risk-based approach to policy development:

  • ignores important compliance issues and regulations.
  • will not be considered a satisfactory method by compliance regulators.
  • satisfies compliance regulations more easily than using another method.
  • is not as effective as a cost-based approach for satisfying compliance regulations.

6) In the lab, you aligned each risk, threat, and vulnerability in the __________ with a policy that should explain how to respond to it.

  • IT infrastructure definition chart
  • IT security policy framework definition chart
  • standards and guidelines table
  • layered security approach list

7) In the lab, for any risk that did not match to a policy, you needed to:

  • identify the employee(s) who could be most vulnerable to the risk.
  • identify the machine(s) or network(s) that could be most vulnerable to the risk.
  • recommend an IT security policy that could eliminate the gap.
  • determine the potential cost if an attack was targeted at that risk.

8) The lab demonstrated how to assess and audit an IT security policy framework definition by performing a(n) __________ with remediation.

  • IT security review
  • domain assessment
  • gap analysis
  • risk analysis

Reference no: EM132677087

Questions Cloud

How model will guide your human resources leadership role : Respond to at least two other peers and compare and contrast what you learned about yourself with what others described. Provide relevant and appropriate.
What is Larry basis in his partnership interest : What is Larry's basis in his partnership interest immediately after the formation of the partnership including allocation of partnership liabilities
Implementation of a performance management system : Name the 6 concepts that often come into play in the case of litigation related to the implementation of a performance management system and explain each concep
Conduct a presentation to the management team : In your new role as chief human resources officer (CHRO) for a major retail organization, you have been tasked by the CEO to conduct a presentation.
Domains of a typical it infrastructure : 3)In the lab, you aligned IT security policies throughout the seven domains of a typical IT infrastructure as part of a:
Create sequences which will allow entry of data : Create sequences which will allow entry of data into the AW_STATUS, AW_DISPLAY and SALE tables - the sequences must begin at 300 and go up in steps
How a manager might enlarge or enrich a salesperson : Using the job characteristics model as a guide, discuss how a manager might enlarge or enrich a salesperson's or secretary's job to make it more motivating?
What is the role of corporate travel management : What is the role of corporate travel management in the tourism industry?
Improving organizational culture : Develop the Change Management Plan using Kotter's 8-Step model. Determine the desired outcome as a result of the proposed change.

Reviews

Write a Review

Operation Management Questions & Answers

  Pre-requisite to achieve operational-strategic excellence

With the advent of science and technology, technological innovations have become a pre-requisite to achieve operational and strategic excellence.

  The organizational leadership philosophy on innovation

Competitive advantage according to Hisrich and Kearney (2014) requires organizations to engage in six processes to maintain innovation.

  Many students of the second city training center

Many students of the Second City Training Center arebusinesspeople looking to gain skills for the corporatecontext. What skills from the world of improvisationalcomedy would be valuable to a business manager?

  Created the stolen valor act

In 2006, Congress created the Stolen Valor Act, which made it a crime to falsely claim to have received a medal from the U.S. military.

  The relevance of being prepared for negotiating techniques

What is the relevance of being prepared for negotiating techniques? Think back to the project you have written about in previous modules.

  What is work breakdown structure

What is Work Breakdown Structure (WBS) and how do project managers use it to develop a product?

  In what ways do you think it could be counterproductive

In what ways do you think community service is valuable to the community? In what ways do you think it could be counterproductive?

  What do you think causes bullying in the workplace

What do you think causes bullying in the workplace? Are there ever any circumstances where bullying is appropriate?

  What choice would you make for middle class students

Imagine you are a business executive who is deciding between launching a website in English only or Multilanguage, which is very expensive.

  Determine the main causes of corruption

Determine the main causes of corruption. Determine the effects of corruption on services and service users who are poor.

  Corporate governance-how is corporate governance defined

Stakeholder theory states that many types of groups depend on the fiduciary duties of the company’s management (i.e. employees, customers, suppliers, shareholders, etc.). You will use concepts learned in this Discussion to address your assignments. D..

  Describe the process of performing an external audit

Describe the process of performing an external audit in an organization doing strategic planning for the first time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd