IS CH4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

blueprint

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.

domains

Security ____ are the areas of trust within which users can freely communicate

de jure

Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards

vision

Strategic planning is the process of moving the organization towards its

CISO

The SETA program is the responsibility of the ____ and is a control measure designed to reduce the incidences of accidental security breaches by employees

IETF

The Security Area Working Group acts as an advisory board for the protocols and areas developed and promoted by the Internet Society and the ____.

EISP

The ____ is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts

BIA

The first phase in the development of the contingency planning process is the

a. United States c. Japan b. Germany d. None of the above

What country adopted ISO/IEC 17799?

Operational

____ controls address personnel security, physical security, and the protection of production inputs and outputs.

Managerial

____ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.

SysSPs

____ often function as standards or procedures to be used when configuring or maintaining systems

Network

____-based IDPSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.

a. organizing c. controlling b. leading d. All of the above

Effective management includes planning and

assessment

Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.

5

RAID ____ drives can be hot swapped

a. firewalls c. access controls b. proxy servers d. All of the above

Redundancy can be implemented at a number of points throughout the security architecture, such as in

cold

A ____ site provides only rudimentary services and facilities

DMZ

A buffer against outside attacks is frequently referred to as a(n)

framework

A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.

IR

A(n) ____ plan deals with the identification, classification, response, and recovery from an incident.

roster

An alert ____ is a document containing contact information for the people to be notified in the event of an incident

security

The spheres of ____ are the foundation of the security framework and illustrate how information is under attack from a variety of sources.

ISO/IEC 27002

The stated purpose of ____ is to "give recommendations for information security management for use by those who are responsible for initiating, implementing, or maintaining security in their organization."

electronic vaulting

The transfer of large batches of data to an off-site facility is called


संबंधित स्टडी सेट्स

COMPREHENSIVE AGRARIAN REFORM PROGRAM

View Set

PA - Geriatric and a few odd ball board prep

View Set

Worksheet 14.3: Performance, Breach, and Remedies for Breach of Sales & Lease Contracts, Warranties, CISG

View Set