IAS - Final Examination

Is this your test? Login to manage it. If not, you can generate a test just like it.

This is a non-interactive preview of the quiz content.

1.
2 points
The first phase in the development of the contingency plan process is the development of a(n) ____.
2.
2 points
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.
3.
2 points
Every policy should contain provisions for periodic review and a timetable for that review.
4.
2 points
Security training involves providing members of the organization with detailed information and instruction to prepare them to perform their duties securely.
5.
2 points
____ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.
6.
2 points
The spheres of ____ are the foundation of the security framework and illustrate how information is under attack from a variety of sources.
7.
2 points
What country adopted ISO/IEC 17799?
8.
2 points
Strategic planning is the process of moving the organization towards its ____.
9.
2 points
The Security Area Working Group acts as an advisory board for the protocols and areas developed and promoted by the Internet Society and the ____.
10.
2 points
A ____ site provides only rudimentary services and facilities.
11.
2 points
Database shadowing only processes a duplicate in real-time data storage.
12.
2 points
Effective management includes planning and ____.
13.
2 points
The policy administrator is responsible for the creation, revision, distribution, and storage of the policy.
14.
2 points
____-based IDSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.
15.
2 points
A configuration list is a list of access rights used by file storage systems, object brokers, or other network communications devices to determine which individuals or groups may access an object that it controls.
16.
2 points
Information security safeguards can be grouped into two levels of control; managerial, and remedial
17.
2 points
An alert ____ is a document containing contact information for the individuals to be notified in the event of an incident.
18.
2 points
A policy should state that if employees violate a company policy or any law using company technologies, the company will protect them, and the company is liable for the employee’s actions.
19.
2 points
____ controls also address personnel security, physical security, and the protection of production inputs and outputs.
20.
2 points
Failure to incorporate the organization’s mission, vision, and culture in the development of an information security system practically guarantees the failure of the information security program.
21.
2 points
A disaster recovery plan deals with the preparation for and recovery from a disaster, whether natural or man-made.
22.
2 points
A buffer against outside attacks is frequently referred to as a(n) ____.
23.
1 point
pls answer
24.
2 points
Security ____ are the areas of trust within which users can freely communicate.
25.
2 points
The security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
26.
2 points
The creation and operation of the SETA program is the responsibility of the ____.
27.
2 points
Disaster recovery personnel must know their initial crisis responsibilities without having to rely on supporting documentation.
28.
2 points
The gateway router can be used as the front-line defense against external attacks, as it can be configured to filter incoming data packets based on protocol.
29.
2 points
Management controls address the design and implementation of the security planning process and security program management.
30.
2 points
To remain viable, security policies must have a section outlining individuals responsible for review, a schedule of review, a method for making recommendations for changes, and include a specific policy issuance and planned revision date.
31.
2 points
The security framework is a more detailed version of the security blueprint.
32.
2 points
The ____ is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts.
33.
2 points
Quality security programs begin and end with policy.
34.
2 points
Informational controls guide the development of education, training, and awareness programs for users, administrators, and management.
35.
2 points
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.
36.
2 points
Every member of the organization needs a formal degree or certificate in information security.
37.
2 points
The transfer of large batches of data to an off-site facility is called ____.
38.
2 points
Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards.
39.
2 points
Additional redundancy can be provided by mirroring entire servers known as redundant servers or server fault tolerance.
40.
2 points
Security is everyone’s responsibility; the ____ communities of interest should participate in the process of developing a comprehensive information security program.
41.
2 points
A standard is a plan or course of action used to convey instructions from an organization’s senior-most management to those who make decisions, take actions, and perform other duties.