Who should measure the effectiveness of Information System security related
controls in an organization?
A. The local security specialist
B. The business manager
C. The systems auditor
D. The central security manager
Give this one a try later!
C. the system auditor
One purpose of a security awareness program is to modify:
A. employee's attitudes and behaviors towards enterprise's security posture
B. management's approach towards enterprise's security posture
C. attitudes of employees with sensitive data
D. corporate attitudes about safeguarding data
,Give this one a try later!
A. employee's attitudes and behaviors towards enterprise's security posture
Which of the following phases of a software development life cycle normally
addresses Due Care and Due Diligence?
A. Implementation
B. System feasibility
C. Product design
D. Software plans and requirements
Give this one a try later!
D. software plans and requirements
Who can best decide what are the adequate technical security controls in a
computer-based application system in regards to the protection of the data being
used,
the criticality of the data, and it's sensitivity level ?
A. System Auditor
B. Data or Information Owner
C. System Manager
D. Data or Information user
Give this one a try later!
B. data or information owner
, Contracts and agreements are often times unenforceable or hard to enforce in which
of the following alternate facility recovery agreement?
A. hot site
B. warm site
C. cold site
D. reciprocal agreement
Give this one a try later!
D. Reciprocal agreement
What would be considered the biggest drawback of Host-based Intrusion Detection
systems (HIDS)?
A. It can be very invasive to the host operating system
B. Monitors all processes and activities on the host system only
C. Virtually eliminates limits associated with encryption
D. They have an increased level of visibility and control compared to NIDS
Give this one a try later!
A. it can be very invasive to the host operating system
At what stage of the applications development process should the security
department become involved?
A. Prior to the implementation
B. Prior to systems testing
C. During unit testing
D. During requirements development
Give this one a try later!
controls in an organization?
A. The local security specialist
B. The business manager
C. The systems auditor
D. The central security manager
Give this one a try later!
C. the system auditor
One purpose of a security awareness program is to modify:
A. employee's attitudes and behaviors towards enterprise's security posture
B. management's approach towards enterprise's security posture
C. attitudes of employees with sensitive data
D. corporate attitudes about safeguarding data
,Give this one a try later!
A. employee's attitudes and behaviors towards enterprise's security posture
Which of the following phases of a software development life cycle normally
addresses Due Care and Due Diligence?
A. Implementation
B. System feasibility
C. Product design
D. Software plans and requirements
Give this one a try later!
D. software plans and requirements
Who can best decide what are the adequate technical security controls in a
computer-based application system in regards to the protection of the data being
used,
the criticality of the data, and it's sensitivity level ?
A. System Auditor
B. Data or Information Owner
C. System Manager
D. Data or Information user
Give this one a try later!
B. data or information owner
, Contracts and agreements are often times unenforceable or hard to enforce in which
of the following alternate facility recovery agreement?
A. hot site
B. warm site
C. cold site
D. reciprocal agreement
Give this one a try later!
D. Reciprocal agreement
What would be considered the biggest drawback of Host-based Intrusion Detection
systems (HIDS)?
A. It can be very invasive to the host operating system
B. Monitors all processes and activities on the host system only
C. Virtually eliminates limits associated with encryption
D. They have an increased level of visibility and control compared to NIDS
Give this one a try later!
A. it can be very invasive to the host operating system
At what stage of the applications development process should the security
department become involved?
A. Prior to the implementation
B. Prior to systems testing
C. During unit testing
D. During requirements development
Give this one a try later!