Planning for a co-location to continue business as usual in

Assignment Help Computer Engineering
Reference no: EM13462270

1: According to your textbook which of the following is NOT part of risk analysis:

  • Determine how likely each risk is to occur
  • Identify any risks to assets
  • Implement an acceptable use policy
  • Determine the value of assets

2: A risk is defined as:

  • A weakness in a system
  • A potential for exploit of a weakness in a system
  • The existence of a weakness in a system and the potential for an exploit
  • An attempted security attack

3: If a manager obtains insurance for damage to an asset, this is called risk transference:

  • True
  • False

4: Managers should declare financial statements about asset values:

  • True
  • False

5: A principle that a single person should not have authority to execute a critical task is called:

  • Access control
  • Separation of duties (or privileges)
  • Discretionary control
  • Confidentiality

6: Unauthorized alteration of information is a breach of:

  • Confidentiality
  • Integrity
  • Availability
  • Protocol

7: Of the two types of attackers, which has the potential to do the most damage?

  • Malicious Outsiders
  • Non-Malicious Insiders
  • Non-Malicious Outsiders
  •  Malicious Insiders

8: When controlling information such that only those who get the information are those who require it to do their job is called on a "need to know" basis:

  • True
  • False

9: Planning to have a "hot site" to restart operations in the case of a fatal incident is part of having a:

  • Risk Assessment Plan
  • Vulnerability Assessment Plan
  • Business Continuity Plan

10: Planning for a "co-location" to continue business as usual in the case of an incident that disrupts operations at one site is part of having a:

  • Risk Assessment Plan
  • Disaster Recovery Plan
  • Vulnerability Assessment Plan
  • Business Continuity Plan

11: SLE represents:

  • The proportion of assets that would be destroyed by a risk
  • Damage to an asset each time a risk would incur in a year
  • Number of times a risk may occur in a year
  • Damage to an asset incurred cumulatively for each year of the asset's lifetime

12: Privilege creep means:

  • An administrator gives him or herself the ability to examine private accounts
  • An attacker uses a rootkit to escalate privileges to execute system functions
  • When someone changes roles, they accrue both old and new privileges even if they are not needed
  • When a user logs in as a normal user, the executes an "su" to become a superuser

13: The four choices that managers have when managing risks are, (1) risk avoidance, (2) risk prosecution, (3) risk acceptance, (4) risk transference.

  • True
  • False

14: The encryption algorithm AES avoids security through obscurity:

  • True
  • False

15: A security policy is a written document only:

  • True
  • False

16: Even though very simplistic, security "checklists" such as the ISO 27000: 27001/27002 (17799) - also known as the ISO 27000 (or ISO27K) family of standards is useful for security auditing in preparation for or as part of a security certification:

  • True
  • False

17: Conducting background checks on employees is illegal in the United States:

  • True
  • False

18: Least privilege means allocating only the minimum set of privileges required to perform a job function:

  • True
  • False

Short Essay:

19: Give a brief explanation of the differences between risk assessment and risk management. Give as an example the name of at least one standard or framework that is used for each one:

20: Briefly describe what responsibilities managers have in terms of security. In this description, note that managers in this context are not security officers or officers of a company and do NOT have fiduciary responsibilities. In other words, what are minimum security standards managers must adhere to regardless of their position?

Reference no: EM13462270

Questions Cloud

When building a house a structured modular approach is : answer this question in 200 to 300 words. this is an it programing question1. when building a house a structured
Primary task responsenbspwithin the discussion board area : now that you have defined the quality dimensions you will need to determine which quality process improvement tools
Iproving processes and increasing efficiencies through it : using a company of your choice determine the strategic business goals. develop an it strategy that aligns to the
Web designers use cookies and session variables to : discuss how an object must be an expert on certain sets of information.nbspvisit a business online web presence.
Planning for a co-location to continue business as usual in : 1 according to your textbook which of the following is not part of risk analysisdetermine how likely each risk is to
Identifying and describing how specific system used in an : writenbspa 700- to 1050-word paper identifying and describing how specific system used in an organization has
Visit a businesss online web presence construct a list of : visit a businesss online web presence. construct a list of complex data types that would be needed to store all the
The end result of this course is developing a strategic : the end result of this course is developing a strategic audit. in this module you will outline and draft a
Information is data that is framed in a specific context in : information is data that is framed in a specific context. in this sense information is contextual data that has a level

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd