SlideShare a Scribd company logo
1 of 8
CMGT/430
ENTERPRISE SECURITY
The Latest Version A+ Study Guide
**********************************************
CMGT 430 Entire Course Link
http://www.uopstudy.com/CMGT-430
**********************************************
CMGT 430 Wk 1 - Managementof Information Security, Ch. 8 Quiz
Complete the Ch. 8 Quiz using the MindTap Access link.
Which access control principle limits a user's access to the specific information required to
perform the currently assigned task?
• Separation of duties
• Eyes only
• Least privilege
• Need-to-know
A time-release safe is an example of which type of access control?
• Nondiscretionary
• Temporal isolation
• Content-dependent
• Constrained user interface
In which form of access control is access to a specific set of information contingent on its subject
matter?
• Temporal isolation
• Content-dependent access controls
• None of these
• Constrained user interfaces
Which type of access controls can be role-based or task-based?
• Nondiscretionary
• Constrained
• Content-dependent
• Discretionary
Which of the following specifies the authorization classification of information asset an individual
user is permitted to access, subject to the need-to-know principle?
• Task-based access controls
• Security clearances
• Discretionary access controls
• Sensitivity levels
Under lattice-based access controls, the column of attributes associated with a particular object
(such as a printer) is referred to as which of the following?
• Access control list
• Capabilities table
• Access matrix
• Sensitivity level
Controls that remedy a circumstance or mitigate damage done during an incident are categorized
as which of the following?
• Deterrent
• Preventative
• Corrective
• Compensating
Which security architecture model is based on the premise that higher levels of integrity are more
worthy of trust than lower ones?
• Bell-LaPadula
• Clark-Wilson
• Common Criteria
• Biba
Which control category discourages an incipient incident?
• Compensating
• Preventative
• Remitting
• Deterrent
Which access control principle specifies that no unnecessary access to data exists by regulating
members so they can perform only the minimum data manipulation necessary?
• Need-to-know
• Separation of duties
• Least privilege
• Eyes only
For More Classes Please Visit
http://www.uopstudy.com/
CMGT 430 Wk 2 - Managementof Information Security, Ch. 7 Quiz
Complete the Ch. 7 Quiz using the MindTap Access link.
Which of the following describes an organization's efforts to reduce damage caused by a realized
incident or disaster?
• Transference
• Mitigation
• Acceptance
• Avoidance
The financial savings from using the defense risk treatment strategy to implement a control and
eliminate the financial ramifications of an incident is known as __________.
• probability estimate
• asset valuation
• cost avoidance
• risk acceptance premium
Once a control strategy has been selected and implemented, what should be done on an ongoing
basis to determine their effectiveness and to estimate the remaining risk?
• Evaluation and funding
• Monitoring and measurement
• Analysis and adjustment
• Review and reapplication
Strategies to reestablish operations at the primary site after an adverse event threatens continuity
of business operations are covered by which of the following plans in the mitigation control
approach?
• Damage control plan
• Business continuity plan
• Incident response plan
• Disaster recovery plan
Which of the following can be described as the quantity and nature of risk that organizations are
willing to accept as they evaluate the trade-offs between perfect security and unlimited
accessibility?
• Risk appetite
• Risk assurance
• Residual risk
• Risk termination
By multiplying the asset value by the exposure factor, you can calculate which of the following?
• Value to adversaries
• Annualized cost of the safeguard
• Single loss expectancy
• Annualized loss expectancy
When vulnerabilities have been controlled to the degree possible, there is often remaining risk that
has not been completely removed, shifted, or planned for and is called __________.
• residual risk
• risk assurance
• risk appetite
• risk tolerance
What is the result of subtracting the postcontrol annualized loss expectancy and the ACS from the
precontrol annualized loss expectancy?
• Annualized rate of occurrence
• Single loss expectancy
• Cost–benefit analysis
• Exposure factor
Which of the following determines acceptable practices based on consensus and relationships
among the communities of interest?
• Operational feasibility
• Technical feasibility
• Political feasibility
• Organizational feasibility
What does FAIR rely on to build the risk management framework that is unlike many other risk
management frameworks?
• Quantitative valuation of safeguards
• Subjective prioritization of controls
• Risk analysis estimates
• Qualitative assessment of many risk components
For More Classes Please Visit
http://www.uopstudy.com/
CMGT 430 Wk 3 - Managementof Information Security, Ch. 9 Quiz
Complete the Ch. 9 quiz using the MindTap Access link.
The benefits of ISO certification to organizations achieving it include all of the following
EXCEPT:
• Smoother operations
• Reduced costs
• Lower taxes from governments
• Improved public image
Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan
you are developing is known as which of the following?
• Baselining
• Benchmarking
• Best practices
• Due diligence
Which of the following is not a consideration when selecting recommended best practices?
• Organization structure is similar
• Same networking architecture
• Resource expenditures are practical
• Threat environment is similar
Which of the following InfoSec measurement specifications makes it possible to define success in
the security program?
• Prioritization and selection
• Development approach
• Establishing targets
• Measurements templates
Problems with benchmarking include all but which of the following?
• Recommended practices change and evolve, thus past performance is no indicator of future
success.
• Organizations being benchmarked are seldom identical.
• Organizations don't often share information on successfulattacks.
• Benchmarking doesn't help in determining the desired outcome of the security process.
What are the legal requirements that an organization adopts a standard based on what a prudent
organization should do, and then maintain that standard?
• Due care and due diligence
• Baselining and benchmarking
• Best practices
• Certification and accreditation
Which of the following is not a factor critical to the success of an information security
performance measurement program?
• Strong upper level management support
• Results oriented measurement analysis
• High level of employee buy-in
• Quantifiable performance measurements
Which of the following is a possible result of failure to establish and maintain standards of due
care and due diligence?
• Information system faults
• Baselining
• Benchmarking
• Legal liability
Which of the following is not a question a CISO should be prepared to answer, about a
performance measures program, according to Kovacich?
• What affect will measurement collection have on efficiency?
• Who will collect these measurements?
• Why should these measurements be collected?
• Where will these measurements be collected?
Which of the following terms is described as the process of designing, implementing, and
managing the use of the collected data elements to determine the effectiveness of the overall
security program?
• Standards of due care/diligence
• Baselining
• Performance management
• Best practices
For More Classes Please Visit
http://www.uopstudy.com/
CMGT 430 Wk 5 - Post-Course AssessmentQuiz
Complete the Post-Course Assessment quiz using the MindTap Access link.
What tool would you use if you want to collect information as it is being transmitted on the
network and analyze the contents for the purpose of solving network problems?
• Port scanner
• Content filter
• Packet sniffer
• Vulnerability scanner
Which of the following InfoSec positions is responsible for the day-to-day operation of the
InfoSec program?
• CISO
• Security officer
• Security manager
• Security technician
Which of the following can be described as the quantity and nature of risk that
organizations are willing to accept as they evaluate the trade-offs between perfect security
and unlimited accessibility?
• Risk termination
• Risk appetite
• Residual risk
• Risk assurance
Which document must be changed when evidence changes hands or is stored?
• Affidavit
• Evidentiary material
• Search warrant
• Chain of custody
The C.I.A. triad for computer security includes which of these characteristics?
• Availability
• Authentication
• Authorization
• Accountability
There are three general categories of unethical behavior that organizations and society
should seek to eliminate. Which of the following is not one of them?
• Malice
• Ignorance
• Intent
• Accident
The type of planning that is used to organize the ongoing, day-to-day performance of
tasks is ____________.
• organizational
• tactical
• operational
• strategic
Which is the first step in the contingency planning process among the options listed here?
• Disaster recovery planning
• Business impact analysis
• Business continuity training
• Incident response planning
What is the SETA program designed to do?
• Reduce the occurrence of accidental security breaches.
• Improve operations.
• Increase the efficiency of InfoSec staff.
• Reduce the occurrence of external attacks.
Which type of document is a more detailed statement of what must be done to comply with
a policy?
• Procedure
• Standard
• Guideline
• Practice

More Related Content

What's hot

SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
CM Introduction 081414
CM Introduction 081414CM Introduction 081414
CM Introduction 081414aidanc5
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamJohn D. Johnson
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurancea3virani
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingPECB
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual cisoMichael Ball
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.Priyanka Aash
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 

What's hot (20)

SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
CM Introduction 081414
CM Introduction 081414CM Introduction 081414
CM Introduction 081414
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems Auditing
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 

Similar to Latest A+ Study Guide for Enterprise Security Management

Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know➲ Stella Bridges
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2Manish Kumar
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptxdotco
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 

Similar to Latest A+ Study Guide for Enterprise Security Management (20)

Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptx
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 

More from UOPCourseHelp

Cpss 385 all discussions onlinehelp123.com
Cpss 385 all discussions   onlinehelp123.comCpss 385 all discussions   onlinehelp123.com
Cpss 385 all discussions onlinehelp123.comUOPCourseHelp
 
Cpss 330 all discussions onlinehelp123.com
Cpss 330 all discussions   onlinehelp123.comCpss 330 all discussions   onlinehelp123.com
Cpss 330 all discussions onlinehelp123.comUOPCourseHelp
 
Bshs 445 all discussions onlinehelp123.com
Bshs 445 all discussions   onlinehelp123.comBshs 445 all discussions   onlinehelp123.com
Bshs 445 all discussions onlinehelp123.comUOPCourseHelp
 
Bshs 439 all discussions onlinehelp123.com
Bshs 439 all discussions   onlinehelp123.comBshs 439 all discussions   onlinehelp123.com
Bshs 439 all discussions onlinehelp123.comUOPCourseHelp
 
Bshs 415 all discussions onlinehelp123.com
Bshs 415 all discussions   onlinehelp123.comBshs 415 all discussions   onlinehelp123.com
Bshs 415 all discussions onlinehelp123.comUOPCourseHelp
 
Ech 211 ech211 ech 211 education for service hwtutorial.com
Ech 211 ech211 ech 211 education for service   hwtutorial.comEch 211 ech211 ech 211 education for service   hwtutorial.com
Ech 211 ech211 ech 211 education for service hwtutorial.comUOPCourseHelp
 
Pol 115 pol115 pol 115 education for service uopstudy.com
Pol 115 pol115 pol 115 education for service   uopstudy.comPol 115 pol115 pol 115 education for service   uopstudy.com
Pol 115 pol115 pol 115 education for service uopstudy.comUOPCourseHelp
 
Pol 115 pol115 pol 115 best tutorials guide uopstudy.com
Pol 115 pol115 pol 115 best tutorials guide  uopstudy.comPol 115 pol115 pol 115 best tutorials guide  uopstudy.com
Pol 115 pol115 pol 115 best tutorials guide uopstudy.comUOPCourseHelp
 
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service   uopstudy.comCmgt 433 cmgt433 cmgt 433 education for service   uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.comUOPCourseHelp
 
Ldr 300 ldr300 ldr 300 education for service uopstudy.com
Ldr 300 ldr300 ldr 300 education for service   uopstudy.comLdr 300 ldr300 ldr 300 education for service   uopstudy.com
Ldr 300 ldr300 ldr 300 education for service uopstudy.comUOPCourseHelp
 
Ldr 300 ldr300 ldr 300 best tutorials guide uopstudy.com
Ldr 300 ldr300 ldr 300 best tutorials guide  uopstudy.comLdr 300 ldr300 ldr 300 best tutorials guide  uopstudy.com
Ldr 300 ldr300 ldr 300 best tutorials guide uopstudy.comUOPCourseHelp
 
Spe 300 spe300 spe 300 education for service uopstudy.com
Spe 300 spe300 spe 300 education for service   uopstudy.comSpe 300 spe300 spe 300 education for service   uopstudy.com
Spe 300 spe300 spe 300 education for service uopstudy.comUOPCourseHelp
 
Eco 370 eco370 eco 370 education for service uopstudy.com
Eco 370 eco370 eco 370 education for service   uopstudy.comEco 370 eco370 eco 370 education for service   uopstudy.com
Eco 370 eco370 eco 370 education for service uopstudy.comUOPCourseHelp
 
Soc 315 soc315 soc 315 education for service uopstudy.com
Soc 315 soc315 soc 315 education for service   uopstudy.comSoc 315 soc315 soc 315 education for service   uopstudy.com
Soc 315 soc315 soc 315 education for service uopstudy.comUOPCourseHelp
 
Soc 315 soc315 soc 315 best tutorials guide uopstudy.com
Soc 315 soc315 soc 315 best tutorials guide  uopstudy.comSoc 315 soc315 soc 315 best tutorials guide  uopstudy.com
Soc 315 soc315 soc 315 best tutorials guide uopstudy.comUOPCourseHelp
 
Cyb 225 cyb225 cyb 225 education for service uopstudy.com
Cyb 225 cyb225 cyb 225 education for service   uopstudy.comCyb 225 cyb225 cyb 225 education for service   uopstudy.com
Cyb 225 cyb225 cyb 225 education for service uopstudy.comUOPCourseHelp
 
Cyb 225 cyb225 cyb 225 best tutorials guide uopstudy.com
Cyb 225 cyb225 cyb 225 best tutorials guide  uopstudy.comCyb 225 cyb225 cyb 225 best tutorials guide  uopstudy.com
Cyb 225 cyb225 cyb 225 best tutorials guide uopstudy.comUOPCourseHelp
 
Hrm 300 t hrm300t hrm 300t education for service uopstudy.com
Hrm 300 t hrm300t hrm 300t education for service   uopstudy.comHrm 300 t hrm300t hrm 300t education for service   uopstudy.com
Hrm 300 t hrm300t hrm 300t education for service uopstudy.comUOPCourseHelp
 
Ech 211 ech211 ech 211 education for service uopstudy.com
Ech 211 ech211 ech 211 education for service   uopstudy.comEch 211 ech211 ech 211 education for service   uopstudy.com
Ech 211 ech211 ech 211 education for service uopstudy.comUOPCourseHelp
 
Ech 205 ech205 ech 205 education for service uopstudy.com
Ech 205 ech205 ech 205 education for service   uopstudy.comEch 205 ech205 ech 205 education for service   uopstudy.com
Ech 205 ech205 ech 205 education for service uopstudy.comUOPCourseHelp
 

More from UOPCourseHelp (20)

Cpss 385 all discussions onlinehelp123.com
Cpss 385 all discussions   onlinehelp123.comCpss 385 all discussions   onlinehelp123.com
Cpss 385 all discussions onlinehelp123.com
 
Cpss 330 all discussions onlinehelp123.com
Cpss 330 all discussions   onlinehelp123.comCpss 330 all discussions   onlinehelp123.com
Cpss 330 all discussions onlinehelp123.com
 
Bshs 445 all discussions onlinehelp123.com
Bshs 445 all discussions   onlinehelp123.comBshs 445 all discussions   onlinehelp123.com
Bshs 445 all discussions onlinehelp123.com
 
Bshs 439 all discussions onlinehelp123.com
Bshs 439 all discussions   onlinehelp123.comBshs 439 all discussions   onlinehelp123.com
Bshs 439 all discussions onlinehelp123.com
 
Bshs 415 all discussions onlinehelp123.com
Bshs 415 all discussions   onlinehelp123.comBshs 415 all discussions   onlinehelp123.com
Bshs 415 all discussions onlinehelp123.com
 
Ech 211 ech211 ech 211 education for service hwtutorial.com
Ech 211 ech211 ech 211 education for service   hwtutorial.comEch 211 ech211 ech 211 education for service   hwtutorial.com
Ech 211 ech211 ech 211 education for service hwtutorial.com
 
Pol 115 pol115 pol 115 education for service uopstudy.com
Pol 115 pol115 pol 115 education for service   uopstudy.comPol 115 pol115 pol 115 education for service   uopstudy.com
Pol 115 pol115 pol 115 education for service uopstudy.com
 
Pol 115 pol115 pol 115 best tutorials guide uopstudy.com
Pol 115 pol115 pol 115 best tutorials guide  uopstudy.comPol 115 pol115 pol 115 best tutorials guide  uopstudy.com
Pol 115 pol115 pol 115 best tutorials guide uopstudy.com
 
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service   uopstudy.comCmgt 433 cmgt433 cmgt 433 education for service   uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.com
 
Ldr 300 ldr300 ldr 300 education for service uopstudy.com
Ldr 300 ldr300 ldr 300 education for service   uopstudy.comLdr 300 ldr300 ldr 300 education for service   uopstudy.com
Ldr 300 ldr300 ldr 300 education for service uopstudy.com
 
Ldr 300 ldr300 ldr 300 best tutorials guide uopstudy.com
Ldr 300 ldr300 ldr 300 best tutorials guide  uopstudy.comLdr 300 ldr300 ldr 300 best tutorials guide  uopstudy.com
Ldr 300 ldr300 ldr 300 best tutorials guide uopstudy.com
 
Spe 300 spe300 spe 300 education for service uopstudy.com
Spe 300 spe300 spe 300 education for service   uopstudy.comSpe 300 spe300 spe 300 education for service   uopstudy.com
Spe 300 spe300 spe 300 education for service uopstudy.com
 
Eco 370 eco370 eco 370 education for service uopstudy.com
Eco 370 eco370 eco 370 education for service   uopstudy.comEco 370 eco370 eco 370 education for service   uopstudy.com
Eco 370 eco370 eco 370 education for service uopstudy.com
 
Soc 315 soc315 soc 315 education for service uopstudy.com
Soc 315 soc315 soc 315 education for service   uopstudy.comSoc 315 soc315 soc 315 education for service   uopstudy.com
Soc 315 soc315 soc 315 education for service uopstudy.com
 
Soc 315 soc315 soc 315 best tutorials guide uopstudy.com
Soc 315 soc315 soc 315 best tutorials guide  uopstudy.comSoc 315 soc315 soc 315 best tutorials guide  uopstudy.com
Soc 315 soc315 soc 315 best tutorials guide uopstudy.com
 
Cyb 225 cyb225 cyb 225 education for service uopstudy.com
Cyb 225 cyb225 cyb 225 education for service   uopstudy.comCyb 225 cyb225 cyb 225 education for service   uopstudy.com
Cyb 225 cyb225 cyb 225 education for service uopstudy.com
 
Cyb 225 cyb225 cyb 225 best tutorials guide uopstudy.com
Cyb 225 cyb225 cyb 225 best tutorials guide  uopstudy.comCyb 225 cyb225 cyb 225 best tutorials guide  uopstudy.com
Cyb 225 cyb225 cyb 225 best tutorials guide uopstudy.com
 
Hrm 300 t hrm300t hrm 300t education for service uopstudy.com
Hrm 300 t hrm300t hrm 300t education for service   uopstudy.comHrm 300 t hrm300t hrm 300t education for service   uopstudy.com
Hrm 300 t hrm300t hrm 300t education for service uopstudy.com
 
Ech 211 ech211 ech 211 education for service uopstudy.com
Ech 211 ech211 ech 211 education for service   uopstudy.comEch 211 ech211 ech 211 education for service   uopstudy.com
Ech 211 ech211 ech 211 education for service uopstudy.com
 
Ech 205 ech205 ech 205 education for service uopstudy.com
Ech 205 ech205 ech 205 education for service   uopstudy.comEch 205 ech205 ech 205 education for service   uopstudy.com
Ech 205 ech205 ech 205 education for service uopstudy.com
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Latest A+ Study Guide for Enterprise Security Management

  • 1. CMGT/430 ENTERPRISE SECURITY The Latest Version A+ Study Guide ********************************************** CMGT 430 Entire Course Link http://www.uopstudy.com/CMGT-430 ********************************************** CMGT 430 Wk 1 - Managementof Information Security, Ch. 8 Quiz Complete the Ch. 8 Quiz using the MindTap Access link. Which access control principle limits a user's access to the specific information required to perform the currently assigned task? • Separation of duties • Eyes only • Least privilege • Need-to-know A time-release safe is an example of which type of access control? • Nondiscretionary • Temporal isolation • Content-dependent • Constrained user interface In which form of access control is access to a specific set of information contingent on its subject matter? • Temporal isolation • Content-dependent access controls • None of these • Constrained user interfaces
  • 2. Which type of access controls can be role-based or task-based? • Nondiscretionary • Constrained • Content-dependent • Discretionary Which of the following specifies the authorization classification of information asset an individual user is permitted to access, subject to the need-to-know principle? • Task-based access controls • Security clearances • Discretionary access controls • Sensitivity levels Under lattice-based access controls, the column of attributes associated with a particular object (such as a printer) is referred to as which of the following? • Access control list • Capabilities table • Access matrix • Sensitivity level Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following? • Deterrent • Preventative • Corrective • Compensating Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones? • Bell-LaPadula • Clark-Wilson • Common Criteria • Biba Which control category discourages an incipient incident? • Compensating • Preventative • Remitting • Deterrent Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary? • Need-to-know
  • 3. • Separation of duties • Least privilege • Eyes only For More Classes Please Visit http://www.uopstudy.com/ CMGT 430 Wk 2 - Managementof Information Security, Ch. 7 Quiz Complete the Ch. 7 Quiz using the MindTap Access link. Which of the following describes an organization's efforts to reduce damage caused by a realized incident or disaster? • Transference • Mitigation • Acceptance • Avoidance The financial savings from using the defense risk treatment strategy to implement a control and eliminate the financial ramifications of an incident is known as __________. • probability estimate • asset valuation • cost avoidance • risk acceptance premium Once a control strategy has been selected and implemented, what should be done on an ongoing basis to determine their effectiveness and to estimate the remaining risk? • Evaluation and funding • Monitoring and measurement • Analysis and adjustment • Review and reapplication Strategies to reestablish operations at the primary site after an adverse event threatens continuity of business operations are covered by which of the following plans in the mitigation control approach? • Damage control plan • Business continuity plan • Incident response plan • Disaster recovery plan Which of the following can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility? • Risk appetite
  • 4. • Risk assurance • Residual risk • Risk termination By multiplying the asset value by the exposure factor, you can calculate which of the following? • Value to adversaries • Annualized cost of the safeguard • Single loss expectancy • Annualized loss expectancy When vulnerabilities have been controlled to the degree possible, there is often remaining risk that has not been completely removed, shifted, or planned for and is called __________. • residual risk • risk assurance • risk appetite • risk tolerance What is the result of subtracting the postcontrol annualized loss expectancy and the ACS from the precontrol annualized loss expectancy? • Annualized rate of occurrence • Single loss expectancy • Cost–benefit analysis • Exposure factor Which of the following determines acceptable practices based on consensus and relationships among the communities of interest? • Operational feasibility • Technical feasibility • Political feasibility • Organizational feasibility What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks? • Quantitative valuation of safeguards • Subjective prioritization of controls • Risk analysis estimates • Qualitative assessment of many risk components For More Classes Please Visit http://www.uopstudy.com/ CMGT 430 Wk 3 - Managementof Information Security, Ch. 9 Quiz
  • 5. Complete the Ch. 9 quiz using the MindTap Access link. The benefits of ISO certification to organizations achieving it include all of the following EXCEPT: • Smoother operations • Reduced costs • Lower taxes from governments • Improved public image Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan you are developing is known as which of the following? • Baselining • Benchmarking • Best practices • Due diligence Which of the following is not a consideration when selecting recommended best practices? • Organization structure is similar • Same networking architecture • Resource expenditures are practical • Threat environment is similar Which of the following InfoSec measurement specifications makes it possible to define success in the security program? • Prioritization and selection • Development approach • Establishing targets • Measurements templates Problems with benchmarking include all but which of the following? • Recommended practices change and evolve, thus past performance is no indicator of future success. • Organizations being benchmarked are seldom identical. • Organizations don't often share information on successfulattacks. • Benchmarking doesn't help in determining the desired outcome of the security process. What are the legal requirements that an organization adopts a standard based on what a prudent organization should do, and then maintain that standard? • Due care and due diligence • Baselining and benchmarking • Best practices • Certification and accreditation Which of the following is not a factor critical to the success of an information security performance measurement program?
  • 6. • Strong upper level management support • Results oriented measurement analysis • High level of employee buy-in • Quantifiable performance measurements Which of the following is a possible result of failure to establish and maintain standards of due care and due diligence? • Information system faults • Baselining • Benchmarking • Legal liability Which of the following is not a question a CISO should be prepared to answer, about a performance measures program, according to Kovacich? • What affect will measurement collection have on efficiency? • Who will collect these measurements? • Why should these measurements be collected? • Where will these measurements be collected? Which of the following terms is described as the process of designing, implementing, and managing the use of the collected data elements to determine the effectiveness of the overall security program? • Standards of due care/diligence • Baselining • Performance management • Best practices For More Classes Please Visit http://www.uopstudy.com/ CMGT 430 Wk 5 - Post-Course AssessmentQuiz Complete the Post-Course Assessment quiz using the MindTap Access link. What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems? • Port scanner • Content filter • Packet sniffer • Vulnerability scanner Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program? • CISO
  • 7. • Security officer • Security manager • Security technician Which of the following can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility? • Risk termination • Risk appetite • Residual risk • Risk assurance Which document must be changed when evidence changes hands or is stored? • Affidavit • Evidentiary material • Search warrant • Chain of custody The C.I.A. triad for computer security includes which of these characteristics? • Availability • Authentication • Authorization • Accountability There are three general categories of unethical behavior that organizations and society should seek to eliminate. Which of the following is not one of them? • Malice • Ignorance • Intent • Accident The type of planning that is used to organize the ongoing, day-to-day performance of tasks is ____________. • organizational • tactical • operational • strategic Which is the first step in the contingency planning process among the options listed here? • Disaster recovery planning • Business impact analysis • Business continuity training • Incident response planning
  • 8. What is the SETA program designed to do? • Reduce the occurrence of accidental security breaches. • Improve operations. • Increase the efficiency of InfoSec staff. • Reduce the occurrence of external attacks. Which type of document is a more detailed statement of what must be done to comply with a policy? • Procedure • Standard • Guideline • Practice