Example of a preventive control

Assignment Help Operation Management
Reference no: EM132676959

A firewall can be an example of a preventive control. True  A vulnerabilityrisk True

  •  False

 is a a human caused or natural event that could impact the system, whereas a  is a weakness in the system that can be exploited.

  •  False

A regional bank at which you are preforming a security assessment has placed a remote access server outside the firewall to provide a front-end for remote employees. This is an example of a ________________.

  • Bastion Host
  • Demilitarized Zone
  • Proxy Server
  • Intrusion Detection System (IDS)

An organization has opened a new office in a somewhat risky neighborhood. The office manager installs a CCTV system to monitor the perimeter and main entrance 24 hours a day. This an example of a _____________ control.

  • Preventive
  • Detective
  • Administrative
  • Corrective

The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart device in the end user's physical possession and any device accessed by the end user, such as a smartphone, laptop, workstation, or mobile device.

  • Workstation
  • User
  • WAN
  • System/Application

Your organization has recently adopted a policy that requires monthly ssecurity training for all users. What type of control does this represent?

  • Physical
  • Technical
  • Compensatory
  • Administrative/Procedural

Your organization requires the use of a RSA token as well as a username and password to connect to the network remotely. This an example of what type of Authentication mechanism?

  • Biometric
  • Two-factor
  • Single-factor
  • Token

The elements of Information Assurance are Confidentiality, Integrity, Availability, Authentication, and what?

  • Nonrepudiation
  • Encryption
  • Compliance
  • Authorization

Integrity ensures that only authorized individuals have access to data.

  •  True
  •  False 

Availability ensures information is available to authorized users and devices. Initially, the information owner must determine availability requirements. The owner must determine who needs access to the data and when.

  •  True
  •  False  

___________________ is the act of protecting information and the systems that store and process it.

  • Risk Assessment
  • Policy Framework
  • Information Systems Security
  • Change Mangement  

It is important for leaders in information systems security to:

  • Demonstrate ethical behavior.
  • Require ethical behavior from employees.
  • Recognize and work with various personality types.
  • Work with others to gain support for and adherence to security policies.
  • All of the above.

Refer back to question 13. The most difficult and time consuming step of policy implementation is also the last step. What step is that?

  • Anchor the Changes in Corporate Culture
  • Assemble a Powerful Coliation
  • Communicate the Vision
  • Create Urgency

What defines how an organization performs and conducts business functions and transactions with a desired outcome?

  • Policy
  • Standards
  • Procedures
  • Guidelines
  • All of the above

The first step in incident response takes its name from a medical term and is the art of rapidly assessing how severe an incident is. Which is the correct term?

  • Analysis
  • OpSec
  • Containment
  • Triage

A firewall can be an example of a technical control.

  •  True
  •  False

Reference no: EM132676959

Questions Cloud

Prepare journal entries for Whispering Company : Prepare journal entries for Whispering Company to (a) record the transactions related to these bonds in 2020
Find average requirements during lead time : For this item we desire a 88 percent service level. What are our average requirements during lead time? (Number only, no units)
What are two conditions for internal measure to be effective : To monitor companies' performance, they are using some Performance Measures. Explain Financial Measure, External Measure and Internal Measure based on Operation
Determine the amount of impairment loss : Presented below are two independent cases related to available-for-sale debt investments. Determine the amount of impairment loss
Example of a preventive control : A firewall can be an example of a preventive control. True A vulnerabilityrisk True
Stakeholders and interrelationships : Describe how the activities influenced your awareness and understanding of the interrelationship between business and society.
Compare e-mart and a convenience store : Compare E-mart and a convenience store like 7-Eleven in terms of the product attributes that customers expect
How long does a car spend in the drive- through line : Assume that no car that enters the line leaves without service. On average, how long does a car spend in the drive- through line?
Perform the analysis for making a pizza : Perform the following analysis for making a pizza: Draw a process map. Identify inputs, transformation, outputs, and value created.

Reviews

Write a Review

Operation Management Questions & Answers

  Implement flexibility for customer-introduced variability

A foundation of operations in both manufacturing and service environments is vital in order to drive inefficiencies and examine ways to achieve greater supply chain integration with suppliers and customers. how would you implement flexibility for cus..

  The importance of process selection in system design

Explain the importance of process selection in system design. Provide an example to support your explanation.

  Discuss any entrepreneurial business ventures-products

Discuss any entrepreneurial business ventures/products/services you have encountered. Are there any new businesses you frequent?

  What is the average number in the queue

What is the average number in the queue? What is the avg customer time in the system? in minutes

  Describe the performance appraisal process

Describe the performance appraisal process and explain its importance in the training of international business managers

  Create diverse team of employees with different strengths

Explain how you could create a diverse team of employees with different strengths. Use scenarios to convey your idea.

  Customer compatibility management

Explain how customers themselves can undermine the efforts of service marketers to provide them with satisfying service experiences. Define the following terms: Customer compatibility management, customer mix, and customer scripts.

  Discuss system security as listed under system requirements

Discuss “System Security” as listed under “System Requirements/Features”.

  Eproducts corporation market competing software products

Data Analytics, Inc., and eProducts Corporation market competing software products. Data Analytics launches an advertising campaign claiming that eProducts, instead of testing software before it is marketed, has customers “test” the software by using..

  What is an annotated bibliography

What is an annotated bibliography. What is a hurdle rate and why write an annotated bibliography.

  Assimilation and inclusion

We will discuss assimilation and inclusion. what do you believe is the difference between assimilation and inclusion?

  Is it true application of other theory produce better result

Organisations based on the principles of scientific management will always perform well. Is this true, or might the application of other theories produce better results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd