Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

True or False? A blanket purchase agreement (BPA) creates preapproved accounts with qualified suppliers to fulfill recurring orders for products or services.

T

True or False? A business continuity plan (BCP) directs all activities required to ensure that an organization's critical business functions continue when an interruption occurs that affects the organization's viability.

T

True or False? A challenge created by the Internet of Things (IoT) is how to protect personal identity and private data from theft or unauthorized access.

T

True or False? A parallel test of a contingency plan is the same as a full-interruption test except that processing does not stop at the primary site.

T

True or False? A successful business impact analysis (BIA) maps the context, the critical business functions (CBFs), and the processes on which they rely.

T

True or False? American Institute of Certified Public Accountants (AICPA) Service Organization Control (SOC) 2 reports are commonly implemented for service providers, hosted data centers, and managed cloud computing providers.

T

True or False? An American Institute of Certified Public Accountants (AICPA) Service Organization Control (SOC) 3 report is intended for public consumption.

T

True or False? An IT security policy framework is like an outline that identifies where security controls should be used.

T

True or False? An organization can maintain a cloud-based disaster recovery site for a fraction of the cost of a physical site.

T

True or False? Bring Your Own Device (BYOD) often replaces the need for the organization to procure limited mobile device model options and issue them to employees for individual use.

T

True or False? Change control is the management of changes to the configuration of a system.

T

True or False? Company-related classifications are not standard; therefore, there may be some differences of meaning between the terms "private" and "confidential" in different companies.

T

True or False? During an IT audit, security controls are checked to ensure they are effective, reliable, and functioning as required and expected.

T

True or False? E-commerce systems and applications demand strict confidentiality, integrity, and availability (C-I-A) security controls.

T

True or False? ISO 27002 is a best-practices document that gives guidelines for information security management.

T

True or False? In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.

T

True or False? In remote journaling, a system writes a log of online transactions to an offsite location.

T

True or False? Internet of Things (IoT) upgrades can be difficult to distribute and deploy, leaving gaps in the remediation of IoT devices or endpoints.

T

True or False? Mobile device management (MDM) includes a software application that allows organizations to monitor, control, data wipe, or data delete business data from a personally owned device.

T

True or False? One way to harden a system is to turn off or disable unnecessary services.

T

True or False? Policies that cover data management should cover transitions throughout the data's life cycle.

T

True or False? Procedures help enforce the intent of a policy.

T

True or False? Regarding disaster recovery, an alternate processing center or mirrored site is always ready and under the organization's control.

T

True or False? The Common Criteria is a set of system procurement standards used by several countries.

T

True or False? The User Domain of a typical IT infrastructure defines the people and processes that access an organization's information systems.

T

True or False? The term "risk management" describes the process of identifying, assessing, prioritizing, and addressing risks.

T

True or False? Using the names of superiors to convince another person that a higher authority has allowed access to information is a form of social engineering.

T

True or False? Screen locks are a form of endpoint device security control.

T

True or False? A router is a security appliance that is used to filter Internet Protocol (IP) packets and block unwanted packets.

F

True or False? Configuration changes can be made at any time during a system life cycle, and no process is required.

F

True or False? During a simulation test of a contingency plan, you must shut down the original system at the primary site for the duration.

F

True or False? Mandatory vacations minimize risk by rotating employees among various systems or duties.

F

True or False? Regarding data-center alternatives for disaster recovery, a mobile site is the least expensive option but at the cost of the longest switchover time.

F

True or False? Regulatory compliance means complying with an organization's own policies, audits, culture, and standards.

F

True or False? The process of remediation makes sure all personnel are aware of and comply with an organization's policies.

F

True or False? The term "data owner" refers to the person or group that manages an IT infrastructure.

F

True or False? The waterfall software development model works well in very dynamic environments where requirements change and are often revisited.

F


Ensembles d'études connexes

Chapter 21 - Listening Guide Quiz 11: Strozzi: Amor dormiglione

View Set

Hodnoty čísla, osnova, celok 2.

View Set

MKTG EXAM 2 Q14, Practice Quiz 5 - Mod 12

View Set

Chapter 8: Body Mechanics and Patient Mobility

View Set

Managerial Accounting Chapter 1 Flashcards Raymond Besser

View Set

Chapter 11 Maternal Adaptation During Pregnancy

View Set

1.06 Market Equilibrium, Disequilibrium, and changes in equilibrium

View Set