Reference no: EM13757662
1. The Security policy is designed to address the following
A. Organizational structure
B. Organizational Business objectives
C. The specifics of the Industry that organization belongs
D. All of the above
E. None of the above
2. List the 4 layers recognized by NIST SP 800-16
__________________
___________________
___________________
___________________
3. Following element is not included in Organization security policy
A. Business Ethics
B. Business Continuity
C. Violations Reporting
D. Authentication
4. Following standard has good information on setting up IT security policies
A. ISO 17799
B. COBIT
C. ISACA
D. All of the above
E. None of the above
5. Following standard talks about the employee specific security
A. ISO 17799
B. COBIT
C. ISACA
D. All of the above
E. None of the above
6. An employee was fired after it was revealed in personal email he sent through company mail that he faked sickness few times. Is the firing justified
A. No, because reading his personal emails is violation of his privacy rights
B. Yes, because the privacy is protected when using company resources.
7. List any 4 elements of Security Audit and Alarms model
__________________
___________________
___________________
___________________
8. Application level vulnerabilities are found in the following
A. Syslog
B. Windows System log
C. Windows Application Log
D. Security Log
E. All of the above
9. Fill in the Blanks
ISO Stands for _____________
Purpose of ISO __________________
10. Following is the best data analysis approach to define abnormal events
A. Basic Alerting
B. Baselining
C. Anomaly Detection
D. Correlation
E. All of the above
11. Following analysis approach relies on relating one event to another
A. Basic Alerting
B. Baselining
C. Anomaly Detection
D. Correlation
E. All of the above
12. In the case study, why did the security officer choose MARS system
__________________________
13. Certification most suited for jobs in government organizations
A. CGEIT
B. CISA
C. CSSLP
D. CISSP
E. All of the above
14. Following certification focuses on software development
A. CGEIT
B. CISA
C. CSSLP
D. CISSP
E. All of the above
15. Given an opportunity, which certification would you go for?
________________
Write a research essay on japanese kabuki theatre
: Write a research essay on Japanese Kabuki Theatre, Christopher Marlowe: The Other Elizabethan Playwright, London's Historic Drury Lane Theatre, American Musicals by Stephen Sondheim and Theatre in Prisons.
|
Performance appraisals
: What purpose do they serve under a performance management system? Performance appraisals – are they necessary or not?
|
Generate a random integer in the range
: Write a parallel program with MPI functions, Define an array of size 1000. Generate a random integer in the range of: 0 t0 999 for: n. Generate n random integers in the range of: 0 to 1000 and save them in array.
|
Chemlabs uses raw materials
: Chemlabs uses raw materials I and II to produce two domestic cleaning solutions, A and B. the daily availability of raw material I and II are 150 and 145 units, respectively. One unit of A consumes 0.5 units of I and 0.6 of II. One units of B consume..
|
Talks about the employee specific security
: Following standard talks about the employee specific security, Following standard has good information on setting up IT security policies
|
Capacity utilization and quality in a service operation
: Describe the relationship between capacity utilization and quality in a service operation. Describe the similarities and differences between a workcenter manufacturing process and an assembly line manufacturing process. Describe the similarities and ..
|
The wireless lan technology had a profound impact
: The wireless LAN technology (IEEE802.11x standards) has had a profound impact in short-range communications. Other wireless technologies, particularly Bluetooth, Zigbee, IrDA, RFID and NFC offer shorter-range communication services for various typ..
|
Why do you think people protest
: Why do you think people protest? What aspects of movements do you feel reflect a democratic character and democratic processes?
|
Derive the marginal cost function
: Suppose that Drexanto plans to produce 5600 tons of corn. What is the total cost of producing this amount of corn given that they are producing it as efficiently as possible, and how many units of each input should they use to minimize costs?
|