Quiz #6 Info Sec

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Mark is considering outsourcing security functions to a third-party provider. What benefit is he most likely to achieve?

Access to high level of expertise

Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing?

Authorization

In an accreditation process, who has the authority to approve a system for implementation?

Authorizing official (AO)

Ann is creating a template for the configuration of Windows servers in her organization, it includes the basic security setting that should apply to all systems. What type of document should she create?

Baseline

Which practice is NOT considered unethical under RFC 1087 issued by the Internet Architecture Board (IAB)?

Enforcing the integrity of computer-based information

A hardware configuration chart should NOT include copies of software configurations.

FALSE

A remediation liaison makes sure all personnel are aware of and comply with organization's policies.

FALSE

Change doesn't create a risk for a business.

FALSE

Bob is preparing to dispose of magnetic media and wishes to destroy the data stored on it. Which method is NOT a good approach for destroying data?

Formatting

Which of the following would NOT be considered in the scope of organizational compliance efforts?

Laws

Roger's organization received a mass email message that attempted to trick users into revealing their passwords by pretending to be a help desk representative. What category of social engineering is this an example of?

Phishing

What is NOT a goal of information security awareness programs?

Punish users who violate policy

What is correct order of steps in the charge control process?

Request, impact assessment, approval, build/test, implement, monitor

Classification scope determines what data you should classify; classification process determines how you handle classified data.

TRUE

One advantage of using a security management firm for security monitoring is that it has a high level of expertise.

TRUE

Policies that cover data management should cover transitions throughout the data life cycle

TRUE

Social engineering is deceiving or using people to get around security controls.

TRUE

The idea that users should be granted only the levels of permissions they need in order to perform their duties is called the principle of least privilege.

TRUE

In what software development model does activity progress in a lock-step sequential process where no phase begins until the previous phase is complete?

Waterfall

Often an extension of memorandum of understanding (MOU), the blanket purchase agreement (BPA) serves as an agreement that documents the technical requirements of interconnected assets.

FALSE

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Memorandum of understanding (MOU)

With proactive change management. management initiates the change to achieve a desired goal.

TRUE

Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is NOT normally used to make these type of classification decisions?

Threat

Written security policies document management's goals and objectives

TRUE

Marguerite is creating a budget for a software development project. What phase of the system life cycle is she undertaking?

Project initiation and planning


Set pelajaran terkait

Individual life insurance contract - provisions in options

View Set

unit 8 history terms and multiple choice

View Set

Machine Transcription & Dictation Rules Flash Cards 2017

View Set

Chapter 5 The Flow of Food: Purchasing, Receiving, and Storage 6th

View Set

Anatomy & Physiology Module Test 5

View Set