To ensure that a suitable level of security is maintained

Assignment Help Basic Computer Science
Reference no: EM13986233

Assurance is the process of examining a computer product or system with respect to certain criteria.

2. Problems with providing strong computer security involve only the design phase.

3. IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.

4. To ensure that a suitable level of security is maintained, management must follow up the implementation with an evaluation of the effectiveness of the security controls.

MULTIPLE CHOICES QUESTIONS

5.      __________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A.  Availability        C.  System Integrity

B.  Privacy              D.  Data Integrity

Answer

6.      Security classes are referred to as __________.

A.     security clearances         B.  security classifications

C.      security levels              D.  security properties

Answer

7.      __________ ensures that critical assets are sufficiently protected in a cost-effective manner.

A.  IT control                    B.  IT security management

C.  IT discipline                 D.  IT risk implementations

Answer

8.      The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A.   risk register                   B. corporate security policy

c.   vulnerability source        D. threat assessment

Answer

9.      Which of the following supports the Defense-in-depth strategy?

A.  Abstraction            B. Data Hiding

C   Layering               D. Encryption

Answer

10.  The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.

A.    Access

B.     Asset management

C.     Compliance

D.    Business continuity management

Answer

11.  Which of the following is not a security architecture framework?

A.    Sherwood Applied  Business Security Architecture (SABSA)

B.     NIST Special publication 800-53

C.     ISO 27001 & 27002

D.    Open Web Application Security Project (OWASP)

Answer

12.  Which security management is considered complimentary to ISO/27001 & 20072

A.    SABA

B.     COBIT

C.     NIST Special publication 800-53

D.    OWASP

Answer

13.  The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

A.    asset management

B.     business continuity management

C.     information security incident management

D.    physical and environmental security

Answer 

FILL-IN THE BLANK QUESTIONS

14. A loss of _________ is the disruption of access to or use of information or an information system.

Answer

15.  A subject is said to have a security _________ of a given level.

Answer

16.  ISO details a model process for managing information security that comprises the following steps:  plan, do, ________, and act.

Answer

17.  A _________ on an organization's IT systems identifies areas needing treatment.

Answer: Risk Assessment

Answer Table

True/False

Answer

1

 

2

 

3

 

4

 

Multiple Choices

 

5

 

6

 

7

 

8

 

9

 

10

 

11

 

12

 

13

 

Short Answer

 

14

 

15

 

16

 

17

 

 SHORT ANSWER QUESTIONS

18.  Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

Answer:

19.  The necessity of the "no read up" rule for a multilevel security is fairly obvious. What is the importance of the "no write down" rule?

 Answer

20.  List and briefly define the five alternatives for treating identified risks.

Answer:

Reference no: EM13986233

Questions Cloud

What mass of ore did the crane add to the cart : Objects A and B each have mass m. Each is traveling at speed v and in the opposite direction from the other object. As explained by the law of conservation of momentum, which event could not occur after the two objects collide?
Determine the distance separating the red and violet light : Determine the distance separating the red and violet light as it emerges from the glass. How does the angle of refraction into glass at the air-glass interface compare to the angle of incidence in glass at the glass-air interface?
How many oxygen atoms are there in 0.25 mole of co32- : How many oxygen atoms are there in 0.25 mole of CO32-?
Explain order of operations and why it is necessary : The reason that addition step was done before final division step because the addition operation was contained within the parentheses which needs to be solved before any step.
To ensure that a suitable level of security is maintained : IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.
What is the wavelength resolution for the spectrometer : Treat the plasma diameter as equal to the spot size generated by the laser - The actual diameter of the plasma is related to the incident field power and approaches the spot diameter as the power of the incident field is increase several times over..
Read the article and research the peace model : For this assignment, read the article below and research the PEACE model. In 500 words, tell me what the model is, where it originated, and how it is better than the John Reid technique of interrogations
Discuss one real-life criminal case : Discuss one (1) real-life criminal case, taken from current events, and identify the court that took jurisdiction. Explain why the court that took the case was the appropriate one for the particular circumstances
Crime theory and the white-collar offender : Which theory best describes your view of this white collar offender. Support your position with at least three (3) external references. Assignment checked for plagiarism through SafeAssign

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd