CDS Chapter 4 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Continuity of critical business functions and operations is the first priority in a well-balanced business continuity plan (BCP). True False

False

In a Bring Your Own Device (BYOD) policy, the user acceptance component may include separation of private data from business data. True False

True

Screen locks are a form of endpoint device security control. True False

True

The Gramm-Leach-Bliley Act (GLBA) addresses information security concerns in the financial industry. True False

True

The recovery point objective (RPO) is the maximum amount of data loss that is acceptable. True False

True

The term risk management describes the process of identifying, assessing, prioritizing, and addressing risks. True False

True

What compliance regulation applies specifically to the educational records maintained by schools about students? a. Family Education Rights and Privacy Act (FERPA) b. Health Insurance Portability and Accountability Act (HIPAA) c. Federal Information Security Management Act (FISMA) d. Gramm-Leach-Bliley Act (GLBA)

a. Family Education Rights and Privacy Act (FERPA)

Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that will have the shortest switchover time even though it may be costly. What would be the best option in this situation? a. Hot site b. Warm site c. Cold site d. Primary site

a. Hot site

Which one of the following is an example of a reactive disaster recovery control? a. Moving to a warm site b. Disk mirroring c. Surge suppression d. Antivirus software

a. Moving to a warm site

Fernando is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. What methodology is best suited for George's use? a. Risk Management Guide for Information Technology Systems (NIST SP 800-30) b. CCTA Risk Analysis and Management Method (CRAMM) c. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) d. ISO/IEC 27005, "Information Security Risk Management"

a. Risk Management Guide for Information Technology Systems (NIST SP 800-30)

Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers? a. FFIEC b. FISMA c. HIPAA d. PCI DSS

c. HIPAA

Regarding data center alternatives for disaster recovery, a mobile site is the least expensive option but at the cost of the longest switchover time. True False

False

Removable storage is a software application that allows an organization to monitor and control business data on a personally owned device. True False

False

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals? a. Health Insurance Portability and Accountability Act (HIPAA) b. Payment Card Industry Data Security Standard (PCI DSS) c. Federal Information Security Management Act (FISMA) d. Federal Financial Institutions Examination Council (FFIEC)

b. Payment Card Industry Data Security Standard (PCI DSS)

Ernie is preparing a risk register for his organization's risk management program. Which data element is LEAST likely to be included in a risk register? a. Description of the risk b. Expected impact c. Risk survey results d. Mitigation steps

c. Risk survey results

What is NOT one of the three tenets of information security? a. Confidentiality b. Integrity c. Safety d. Availability

c. Safety

As a follow-up to her annual testing, Holly would like to conduct quarterly disaster recovery tests that introduce as much realism as possible but do not require the use of technology resources. What type of test should Holly conduct? a. Checklist test b. Parallel test c. Simulation test d. Structured walk-through

c. Simulation test

Which item in a Bring Your Own Device (BYOD) policy helps resolve intellectual property issues that may arise as the result of business use of personal devices? a. Support ownership b. Onboarding/offboarding c. Forensics d. Data ownership

d. Data ownership

Which one of the following is an example of a direct cost that might result from a business disruption? a. Damaged reputation b. Lost market share c. Lost customers d. Facility repair

d. Facility repair

What level of technology infrastructure should you expect to find in a cold site alternative data center facility? a. Hardware and data that mirror the primary site b. Hardware that mirrors the primary site, but no data c. Basic computer hardware d. No technology infrastructure

d. No technology infrastructure


Ensembles d'études connexes

Perry: Chapter 4: Reproduction Systems Concerns EAQ

View Set

Comparing fractions, Decimals, and Percents

View Set

Software, File and Platform Services

View Set

Chapter 11 - Managing Project Risks

View Set

OS Worksheet International Trade (Micro)

View Set

BI100 Practice Quizzes (Ch. 10-13)

View Set