INFS 3400 Hasan test 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The transfer of transaction data in real time to an off-site facility is called ____.

remote journaling

Risk _____ is the assessment of the amount of risk an organization is willing to accept for a particular information asset, typically synthesized into the organization's overall risk appetite.

risk tolerance

An alert message is a description of the incident or disaster that usually contains just enough information so that each person knows what portion of the IR or DR plan to implement without slowing down the notification process.

?

25. The first phase of the risk management process is _____. a. risk identification b. forming the risk management planning team c. risk control d. risk evaluation

A

Which if these is the primary reason contingency response teams should not have overlapping membership with one person on multiple teams? a. To spread the work out among more people. b. So individuals don't find themselves with different responsibilities in different locations at the same time. c. To allow people to specialize in one area. d. To avoid cross-division rivalries.

B

Flaws or weaknesses in an information asset, security procedure, design, or control that can be exploited accidentally or on purpose to breach security are known as _____. a. threats b. exploits c. vulnerabilities d. events

C

Risk _____ is the assessment of the amount of risk an organization is willing to accept for a particular information asset, typically synthesized into the organization's overall risk appetite. a. benefit b. baseline c. tolerance d. residual

C

23. The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any _____ purposes. a. troubleshooting b. billing c. customer service d. marketing

D

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a moment's notice. a. mobile site b. cold site c. service bureau d. hot site

D

A threat _____ is an evaluation of the threats to information assets, including a determination of their likelihood of occurrence and potential impact of an attack. a. review b. search c. investigation d. assessment

D

Cultural differences can make it difficult to determine what is ethical and not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal

F

Database shadowing duplicates data in real-time data storage, but does not back up the databases at the remote site.

F

In a cost-benefit analysis, a single loss expectancy (SLE) is the calculated value associated with the most likely loss from an attack; the SLE is the product of the asset's value and the annualized loss expectancy.

F

In a study on software license infringement, licenses from the United States were significantly more permissive than those from the Netherlands and other countries. _____

F

In 2001, the Council of Europe drafted the European Council Cybercrime Convention, which empowers an international task force to oversee a range of security functions associated with _____ activities.

Internet

In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____.

Provide security awareness training

The risk management (RM) _____ is the overall structure of the strategic planning and design for the entirety of the organization's RM efforts.

RM framework

The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources is ____.

Recovery time objective RTO

Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility.

Risk appetite

. Risk control, also known as risk treatment, is the application of controls that reduce the risks to an organization's information assets to an acceptable level.

T

A key difference between a policy and a law is that ignorance of a law is an acceptable defense.

T

A service bureau is an agency that provides a service for a fee. _____

T

Criminal laws address activities and conduct harmful to society and are categorized as public law

T

For policy to become enforceable, it only needs to be distributed, read, understood, agreed to, and applied to all

T

Incident classification is the process of examining an adverse event or incident candidate and determining whether it constitutes an actual incident.

T

Prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment.

T

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of healthcare data.

T

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of healthcare data. _____

T

The business impact analysis is a preparatory activity common to both contingency plan (CP) and risk management

T

The code of ethics put forth by (ISC)2 focuses on four mandatory canons: "Protect society, the commonwealth, and the infrastructure; act honorably, honestly, justly, responsibly, and legally; provide diligent and competent service to principals; and advance and protect the profession." _____

T

The value of information to the organization's competition should influence the asset's valuation

T

individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.

T

​The FTC recommends that people place an initial fraud alert (among other things) when they suspect they are victims of identity theft.

T

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes _____

all of the above- controls have proven ineffective b.controls have failed c.controls have been bypassed d.All of the above

Risk _____ is a determination of the extent to which an organization's information assets are exposed to risk.

assessment

Each of the following is a role for the crisis management response team EXCEPT:

d.Supporting personnel and their loved ones during the crisis?

Identifying human resources, documentation, and data information assets of an organization is easier than identifying hardware and software assets.

f

Cost mitigation ​is the process of preventing the financial impact of an incident by implementing a control. _____

false

_____ is the rapid determination of the scope of the breach in the confidentiality, integrity, and availability of information and information assets during or just following an incident.

incident damage assessment

In the 1999 study of computer use-ethics, which of the following countries reported the least tolerant attitudes toward the misuse of organizational computing resources?

singapore

If the acceptance risk treatment strategy is used to handle every vulnerability in the organization, its managers may be unable to conduct proactive security activities and may portray an apathetic approach to security in general.

t

Likelihood is the probability that a specific vulnerability within an organization will be the target of an attack. _____

t

The _____ risk treatment strategy attempts to shift risk to other assets, other processes, or other organizations.

transference / transfer

In a _____, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores.

weighted factor analysis

In the TVA worksheet, assets are placed into a matrix with threats and then the exposure of the assets to specific threats is explored by documenting _____

? vulnerabilities

Understanding the _____ context means understanding the impact of elements such as the business environment, the legal/regulatory/compliance environment, as well as the threat environment. a. external b. design c. internal d. risk evaluation

A

Which type of organizations should prepare for the unexpected? a. Organizations of every size and purpose should also prepare for the unexpected. b. Large organizations which have many assets at risk. c. Small organizations that can easily recover. d. Only those without good insurance.

A

_____ is simply how often you expect a specific type of attack to occur.

ARO

The sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place is called a(n) _____.

Affidavit

19. There are three general causes of unethical and illegal behavior: _____, Accident, and Intent. a. Curiosity b. Ignorance c. Revenge d. None of the other answers are correct

B

24. Risk _____ is the application of security mechanisms to reduce the risks to an organization's data and information systems. a. avoidance b. treatment c. identification d. assessment

B

The point in time before a disruption or system outage to which business process data can be recovered after an outage is ____. a. recovery time objective (RTO) b. recovery point objective (RPO) c. work recovery time (WRT) d. maximum tolerable downtime (MTD)

B

22. The process of examining an adverse event or incident and determining whether it constitutes an actual disaster is known as _____. a. disaster indication b. incident review c. disaster classification d. event escalation

C

Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present? a. Fear of penalty b. Probability of being caught c. Probability of penalty being administered d. All of the other answers are correct

D

The _____ risk treatment strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation. a. defense b. transference c. mitigation d. acceptance

D

Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications?

ECPA - electronic communications privacy act of 1986

The _____ attempts to prevent trade secrets from being illegally shared.

Economy Espionage Act

Understanding the _____ context means understanding the impact of elements such as the business environment, the legal/regulatory/compliance environment, as well as the threat environment.

External

"Know the enemy" means identifying, examining, and understanding the competition facing the organization.

F

A recovery time objective (RTO) is the total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption

F

In the context of information security, confidentiality is the right of individuals or groups to protect themselves and their information from unauthorized access.

F

Knowing yourself means identifying, examining, and understanding the threats facing the organization's information assets.

F

The Computer Security Act of 1987, the cornerstone of many computer-related federal laws and enforcement efforts, was originally written as an extension and clarification of the Comprehensive Crime Control Act of 1984.

F

The Council of Europe Convention on Cybercrime has not been well received by advocates of intellectual property rights because it de-emphasizes prosecution for copyright infringement.

F

The Department of Homeland Security is the only U.S. federal agency charged with the protection of American information resources and the investigation of threats to, or attacks on, those resources.

F

The Graham-Leach-Bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms.

F

The computer security incident response team is composed solely of technical IT professionals who are prepared to detect, react to, and recover from an incident.

F

The continuity planning management team (CPMT) is the group of senior managers and project members organized to conduct and lead all contingency planning efforts.

F

The key difference between laws and ethics is that ethics carry the authority of a governing body and laws do not.

F

The disaster recovery preparation team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters.

F - Disaster recovery planning DRP

A cold site provides many of the same services and options of a hot site, but at a lower cost.

F - warm site

Risk perception is the assessment of the amount of risk an organization is willing to accept for a particular information asset, typically part of the risk appetite. _____

F- risk tolerance?

Knowing yourself means identifying, examining, and understanding the threats facing the organization's information assets.

F?

The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____.

Identity theft

There are three general causes of unethical and illegal behavior: _____, Accident, and Intent.

Ignorance

The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any _____ purposes.

Marketing

Payment Card Industry _____ Standards are designed to enhance the security of customers' payment card account data.

PCI-DSS

Which if these is the primary reason contingency response teams should not have overlapping membership with one person on multiple teams?

To allow people to specialize in one area

Ethics are the moral attitudes or customs of a particular group. _____

True?

A(n) _____ is a document containing contact information for the people to be notified in the event of an incident.

alert roster

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage _____.

by accident

Risk _____ is the application of security mechanisms to reduce the risks to an organization's data and information systems.

control

The storage of duplicate online transaction data, along with the duplication of the databases, at a remote site on a redundant server is called _____.

database shadowing

The _____ risk treatment strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.

defense

The concept of competitive _____ refers to falling behind the competition.

disadvantage

Most common data backup schemes involve ______.

disk to disk to cloud

An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor with a ____ backup strategy.

disk-to-disk-to-cloud

Which of the following is NOT one of the categories recommended for categorizing information assets?

firmware

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a moment's notice.

hot site

. If the acceptance risk treatment strategy is used to handle every vulnerability in the organization, its managers may be unable to conduct proactive security activities and may portray an apathetic approach to security in general

T

____ uses a number of hard drives to store information across multiple drive units.

RAID


संबंधित स्टडी सेट्स

Kite Runner Plot Analysis: CH. 1-5

View Set

The Art of Public Speaking - Vocab Chapter 11, The Art of Public Speaking - Midterm 1

View Set

HLTH 251 Chapter 14 Sexual Orientation and Identity: Gay, Lesbian, Bi, Straight, or Asexual?

View Set

Ch.3 The Global Environment (LearnSmart)

View Set

AP Psychology: Chapter 18 Social Influence

View Set

ATI Infection Test - Pharmacology

View Set

ATI Adult Medical-Surgical Nursing: Hematologic & Fluid Imbalances

View Set

Chapter 14, Chapter 15, Chapter 16, Chapter 17, Chapter 18

View Set

Chapter 1 - Introduction to Computers and Programming

View Set