AND ANSWERS 100% CORRECT!!
, CISO (chief information security officer) - ANSWER The ______ is the individual
primarily responsible for the assessment, management, and implementation of
information security in the organization.
top-down - ANSWER In the ______ approach, the project is initiated by upper-level
managers who issue policy, procedures, and processes, dictate the goals and expected
outcomes, and determine the accountability for each required action
False - ANSWER Using a methodology will usually have no effect on the probability of
success
Data owners: responsible for the security and use of a certain set of information
Data custodians: responsible for the processing, transmissions, and storage of data
Data users: individuals with an information security role - ANSWER Outline types of
data ownership and their respective responsibilities
Authenticity - ANSWER ______ of information is the quality or state of being genuine or
original, rather than a reproduction or fabrication
False - ANSWER The physical design the the blueprint for the desired solution
project - ANSWER Software is often created under the constraints of _____
management, placing limits on time, cost, and manpower
Network security- protect the contents of the network
Operations security- protect the activities of an operation
Information security- protect the information assets of an organization it is in storage,
being processed, or in transmission
Personnel security- project the people who are allowed to access the organization and
its assets
Communications security- protect the media and communications technology
Physical security- protect the objects and areas of the organization from misuse -
ANSWER Describe the multiple types of security systems present in many
organizations