Secu r ity m id ter m exam n ew pr ep Liber ty
Un iver sity
Question 1
Policies are the key to repeatable behavior. To achieve repeatable behavior,
you must measure both and .
o Consistency, quality
o Defects, incidents
o Mitigation, process
o Quality, impact
Question 2
pts
The Seven Domains of a typical IT infrastructure include?
Security, Wireless, and SMS
LAN, DMZ, and Helpdesk
SMS, WAN, and Technology
LAN-to-WAN, WAN, and Remote Access
Question 3
pts
What term relates to the number of layers and number of direct reports
found in an organization?
Span of control
Flattened organization
Organizational control
Vertical layer
,Question 4
pts
Generally, remote authentication provides which of the following?
, The same controls than if you were in the office
Less need for controls than in the office
Fewer controls than if you were in the office
More controls than if you were in the office
Question 5
pts
Security personnel need to be aware of policy and standards change
requirements. Business drivers for policy and standards changes may
include ?
A and C only
Consistent policy
Mature business processes
Business-as-usual developments
Question 6
pts
Security are the technical implementations of the policies defined by
the organization.
Articles
Procedures
Frameworks
Incidents
Question 7
pts
Which of the following are control objectives for PCI DSS?
Protect cardholder data