You are on page 1of 4

Question 1 0 out of 0.5 points Incorrect The Security Area Working Group endorses ISO/IEC 17799.

Answer Selected Answer: True Correct Answer: False Question 2 0 out of 0.5 points Incorrect You can create a single comprehensive ISSP document covering all information sec urity issues. Answer Selected Answer: False Correct Answer: True Question 3 0 out of 0.5 points Incorrect The ISSP sets out the requirements that must be met by the information security blueprint or framework. Answer Selected Answer: True Correct Answer: False Question 4 0.5 out of 0.5 points Correct Effective management includes planning and ____. Answer Selected Answer: All of the above Correct Answer: All of the above Question 5 0.5 out of 0.5 points Correct Strategic planning is the process of moving the organization towards its ____. Answer Selected Answer: vision Correct Answer: vision Question 6 0.5 out of 0.5 points Correct Management controls address the design and implementation of the security planni ng process and security program management. Answer Selected Answer: True

Correct Answer: Question 7 0.5 out of 0.5 points

True

Correct A(n) capability table specifies which subjects and objects users or groups can a ccess. Answer Selected Answer: True Correct Answer: True Question 8 0.5 out of 0.5 points Correct A buffer against outside attacks is frequently referred to as a(n) ____. Answer Selected Answer: DMZ Correct Answer: DMZ Question 9 0.5 out of 0.5 points Correct A disaster recovery plan addresses the preparation for and recovery from a disas ter, whether natural or man-made. Answer Selected Answer: True Correct Answer: True Question 10 0.5 out of 0.5 points Correct A(n) full backup only archives the files that have been modified that day, and t hus requires less space and time than the differential. Answer Selected Answer: False Correct Answer: False Question 11 0.5 out of 0.5 points Correct Every member of the organization needs a formal degree or certificate in informa tion security. Answer Selected Answer: False Correct Answer: False Question 12 0.5 out of 0.5 points Correct Security ____ are the areas of trust within which users can freely communicate. Answer Selected Answer:

domains Correct Answer: domains Question 13 0.5 out of 0.5 points Correct A firewall can be a single device or a firewall extranet, which consists of mult iple firewalls creating a buffer between the outside and inside networks. Answer Selected Answer: False Correct Answer: False Question 14 0.5 out of 0.5 points Correct A service bureau is an agency that provides a service for a fee. Answer Selected Answer: True Correct Answer: True Question 15 0.5 out of 0.5 points Correct Information security safeguards provide two levels of control: managerial and re medial. Answer Selected Answer: False Correct Answer: False Question 16 0 out of 0.5 points Incorrect Within security perimeters the organization can establish security circles. Answer Selected Answer: True Correct Answer: False Question 17 0.5 out of 0.5 points Correct Redundancy can be implemented at a number of points throughout the security arch itecture, such as in ____. Answer Selected Answer: All of the above Correct Answer: All of the above Question 18 0.5 out of 0.5 points Correct The security framework is a more detailed version of the security blueprint. Answer

Selected Answer: Correct Answer: Question 19 0 out of 0.5 points

False False

Incorrect A(n) sequential roster is activated as the first person calls a few people on th e roster, who in turn call a few other people. Answer Selected Answer: True Correct Answer: False Question 20 0.5 out of 0.5 points Correct A managerial guidance SysSP document is created by the IT experts in a company t o guide management in the implementation and configuration of technology. Answer Selected Answer: False Correct Answer: False

You might also like