




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、每時每刻每時每刻 可信安全可信安全 QUIZ1 Which of the following is not a responsibility of a database administrator?A Maintaining databasesB Implementing access rules to databasesC Reorganizing databasesD Providing access authorization to databasesD每時每刻每時每刻 可信安全可信安全 QUIZ2 According to governmental data classificatio
2、n levels, how would answers to tests and health care information be classified?A ConfidentialB Sensitive but unclassifiedC Private D UnclassifiedB每時每刻每時每刻 可信安全可信安全每時每刻每時每刻 可信安全可信安全 QUIZ3. According to private sector data classification levels, how would salary levels and medical information be class
3、ified? A Confidential B Public C Private D SensitiveC每時每刻每時每刻 可信安全可信安全 QUIZ 4 Which of the next are steps of a common development process of creating a security policy, standards and procedures? A design, development, publication, coding, testing B design, evaluation, approval, publication, implemen
4、tation C initial and evaluation, development, approval, publication, implementation, maintenance D feasibility, development, approval, implementation, integrationC每時每刻每時每刻 可信安全可信安全5 What is the main purpose of a security policy?A to transfer the responsibility for the information security to all use
5、rs of the organizationB to provide detailed steps for performing specific actionsC to provide a common framework for all development activitiesD to provide the management direction and support for information securityD每時每刻每時每刻 可信安全可信安全6 Which of the following department managers would be best suited
6、 to oversee the development of an information security policy?A Security administrationB Human resourcesC Business operationsD Information systemsC每時每刻每時每刻 可信安全可信安全7 Which of the following is not a responsibility of an information owner?A Running regular backups and periodically testing the validity
7、 of the backup data.B Delegate the responsibility of data protection to data custodians.C Periodically review the classification assignments against business needs.D Determine what level of classification the information requires.A每時每刻每時每刻 可信安全可信安全8 Which of the following is not a goal of integrity?
8、A Prevention of the modification of information by unauthorized users.B Prevention of the unauthorized or unintentional modification of information by authorized users.C Prevention of the modification of information by authorized users.D Preservation of the internal and external consistency.C每時每刻每時每
9、刻 可信安全可信安全9 Why do many organizations require every employee to take a mandatory vacation of a week or more?A To lead to greater productivity through a better quality of life for the employee.B To reduce the opportunity for an employee to commit an improper or illegal act.C To provide proper cross t
10、raining for another employee.D To allow more employees to have a better understanding of the overall system.B每時每刻每時每刻 可信安全可信安全10 Which of the following would best relate to resources being used only for intended purposes?A AvailabilityB IntegrityC ReliabilityD ConfidentialityA每時每刻每時每刻 可信安全可信安全11 Sec
11、urity of computer-based information systems is which of the following? A technical issue B management issue C training issue D operational issueB每時每刻每時每刻 可信安全可信安全12 Which of the following would be the first step in establishing an information security program?A Development and implementation of an i
12、nformation security standards manual.B Development of a security awareness-training program for employees.C Purchase of security access control software.D Adoption of a corporate information security policy statement.D每時每刻每時每刻 可信安全可信安全13 Which of the following tasks may be performed by the same pers
13、on in a well-controlled information processing facility/computer center? A Computer operations and system development B System development and change management C System development and systems maintenance D Security administration and change managementC每時每刻每時每刻 可信安全可信安全14 Computer security should n
14、ot: A Cover all identified risks. B Be cost-effective. C Be examined in both monetary and non-monetary terms. D Be proportionate to the value of IT systems.A每時每刻每時每刻 可信安全可信安全15 Which of the following is most concerned with personnel security? A Management controls B Human resources controls C Techni
15、cal controls D Operational controlsD每時每刻每時每刻 可信安全可信安全16 Which of the following is most likely given the responsibility of the maintenance and protection of the data? A Security administrator B User C Data custodian D Data owner C每時每刻每時每刻 可信安全可信安全17 Who is responsible for providing reports to the sen
16、ior management on the effectiveness of the security controls? A Information systems security professionals B Data owners C Data custodians D Information systems auditorsD每時每刻每時每刻 可信安全可信安全18 Risk mitigation and risk reduction controls can be of which of the following types?A preventive, detective, or
17、 correctiveB Administrative, operational or logicalC detective, correctiveD preventive, corrective and administrativeA每時每刻每時每刻 可信安全可信安全19 Which of the following would best classify as a management control? A Review of security controls B Documentation C Personnel security D Physical and environmenta
18、l protectionA每時每刻每時每刻 可信安全可信安全20 What is the goal of the Maintenance phase in a common development process of a security policy? A to present document to approving body B to write proposal to management that states the objectives of the policy C publication within the organization D to review of the
19、 document on the specified review dateD每時每刻每時每刻 可信安全可信安全21 Which approach to a security program makes sure that the people actually responsible for protecting the companys assets are driving the program? A The top-down approach B The bottom-up approach C The technology approach D The Delphi approach
20、A每時每刻每時每刻 可信安全可信安全22 The preliminary steps to security planning include all of the following EXCEPT which of the following? A Determine alternate courses of action B Establish a security audit function. C Establish objectives. D List planning assumptions.B每時每刻每時每刻 可信安全可信安全23IT security measures shou
21、ld: A Be tailored to meet organizational security goals. B Make sure that every asset of the organization is well protected. C Not be developed in a layered fashion. D Be complexA每時每刻每時每刻 可信安全可信安全24 Which of the following embodies all the detailed actions that personnel are required to follow? A Bas
22、elines B Procedures C Guidelines D StandardsB每時每刻每時每刻 可信安全可信安全25 Which of the following should NOT be addressed by employee termination practices? A Deletion of assigned logon-ID and passwords to prohibit system access. B Return of access badges. C Employee bonding to protect against losses due to t
23、heft. D Removal of the employee from active payroll files.C每時每刻每時每刻 可信安全可信安全26 Preservation of confidentiality information systems requires that the information is not disclosed to: A Authorized persons and processes B Unauthorized persons. C Unauthorized persons or processes. D Authorized personC每時
24、每刻每時每刻 可信安全可信安全27 Which of the following statements pertaining to quantitative risk analysis is false?A It requires a high volume of informationB It involves complex calculationsC It can be automatedD It involves a lot of guessworkD每時每刻每時每刻 可信安全可信安全28 All except which of the follow are not used to e
25、nsure integrity? A compliance monitoring services B intrusion detection services C communications security management D firewall servicesA每時每刻每時每刻 可信安全可信安全29 Which of the following would violate the Due Care concept? A Latest security patches for servers only being installed once a week B Network ad
26、ministrator not taking mandatory two-week vacation as planned C Security policy being outdated D Data owners not laying out the foundation of data protectionD每時每刻每時每刻 可信安全可信安全30 What does residual risk mean? A Weakness of an assets which can be exploited by a threat B Risk that remains after risk an
27、alysis has has been performed C The result of unwanted incident D The security risk that remains after controls have been implementedD每時每刻每時每刻 可信安全可信安全31 Which of the following questions should any user not be able to answer regarding their organizations information security policy? A Where is the o
28、rganizations security policy defined? B Who is involved in establishing the security policy? C What are the actions that need to be performed in case of a disaster? D Who is responsible for monitoring compliance to the organizations security policy?C每時每刻每時每刻 可信安全可信安全32 In a properly segregated envir
29、onment, which of the following tasks is compatible with the task of security administrator? A Data entry B Systems programming C Quality assurance D Applications programmingC每時每刻每時每刻 可信安全可信安全33 The major objective of system configuration management is which of the following?A system maintenanceB sys
30、tem trackingC system stabilityD system operationsC每時每刻每時每刻 可信安全可信安全34 In an organization, an Information Technology security function should: A Be independent but report to the Information Systems function. B Be lead by a Chief Security Officer and report directly to the CEO. C Report directly to a
31、specialized business unit such as legal, corporate security or insurance. D Be a function within the information systems function of an organization.B每時每刻每時每刻 可信安全可信安全35 Who should measure the effectiveness of security related controls in an organization? A the central security manager B the local s
32、ecurity specialist C the systems auditor D the business managerC每時每刻每時每刻 可信安全可信安全36 What is a difference between Quantitative and Qualitative Risk Analysis? A fully qualitative analysis is not possible, while quantitative is B quantitative provides formal cost/benefit analysis and qualitative not C
33、there is no difference between qualitative and quantitative analysis D qualitative uses strong mathematical formulas and quantitative notB每時每刻每時每刻 可信安全可信安全37 How is Annualized Loss Expectancy ALE derived from a treat? A ARO x SLE - EF B SLE x ARO C SLE/EF D AV x EFB每時每刻每時每刻 可信安全可信安全38 One purpose of
34、 a security awareness program is to modify: A attitudes of employees with sensitive data. B corporate attitudes about safeguarding data. C employees attitudes and behaviors. D managements approach.C每時每刻每時每刻 可信安全可信安全39 Controls are implemented to: A eliminate risk and reduce the potential for loss B
35、mitigate risk and eliminate the potential for loss C eliminate risk and eliminate the potential for loss D mitigate risk and reduce the potential for lossD每時每刻每時每刻 可信安全可信安全40 Who should decide how a company should approach security and what security measures should be implemented?A The information s
36、ecurity specialistB AuditorC Senior managementD Data ownerC每時每刻每時每刻 可信安全可信安全41 Which of the following is the weakest link in a security system? A People B Communications C Hardware D SoftwareA每時每刻每時每刻 可信安全可信安全42 ISO 17799 is a standard for:A Information Security ManagementB Implementation and certif
37、ication of basic security measuresC Certification of public key infrastructuresD Evaluation criteria for the validation of cryptographic algorithmsA每時每刻每時每刻 可信安全可信安全43Who of the following is responsible for ensuring that proper controls are in place to address integrity, confidentiality, and availab
38、ility of IT systems and data?A Business and functional managersB Chief information officerC IT Security practitionersD System and information ownersD每時每刻每時每刻 可信安全可信安全44 Related to information security, the guarantee that the message sent is the message received is an example of which of the followin
39、g?A integrityB identityC availabilityD confidentialityA每時每刻每時每刻 可信安全可信安全45 Which one of the following represents an ALE calculation? A asset value x loss expectancy B actual replacement cost - proceeds of salvage C gross loss expectancy x loss frequency D single loss expectancy x annualized rate of
40、occurrenceD每時每刻每時每刻 可信安全可信安全46 Which of the following choices is NOT part of a security policy?A description of specific technologies used in the field of information securityB definition of overall steps of information security and the importance of securityC statement of management intend, support
41、ing the goals and principles of information securityD definition of general and specific responsibilities for information security managementA每時每刻每時每刻 可信安全可信安全47 Which of the following statements pertaining to a security policy is incorrect? A It must be flexible to the changing environment. B Its main purpose is to inform the users, administrators and managers of their obligatory r
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度汽車保險代理合同
- 二零二五年度花卉租擺與植物養(yǎng)護(hù)服務(wù)合同
- 二零二五年度信用卡透支貸款協(xié)議書
- 二零二五年度銀行與交通企業(yè)物流金融合同標(biāo)準(zhǔn)
- 二零二五年度事業(yè)單位專業(yè)技術(shù)聘用合同(事業(yè)單位公共衛(wèi)生)
- 二零二五年度日本語言學(xué)校入學(xué)合同
- 二零二五年度古風(fēng)建筑貼磚人工合同
- 二零二五年度生物科技研發(fā)三方合伙經(jīng)營協(xié)議書
- 轉(zhuǎn)正發(fā)言稿簡短表態(tài)
- 2025年河北貨車資格從業(yè)資格證考試答案
- 企業(yè)所得稅匯算清繳申報表電子表格版(帶公式-自動計算)
- 2024年巴西脈沖灌洗系統(tǒng)市場機(jī)會及渠道調(diào)研報告
- 新媒體營銷:營銷方式+推廣技巧+案例實訓(xùn) 微課版 第2版 教案全套
- 2024年5月時政熱點題庫及答案(一)
- 提高糖尿病患者自我注射胰島素的規(guī)范率(內(nèi)分泌科QCC成果匯報)
- 電子產(chǎn)品工藝文件模板-2024
- 測繪地理信息標(biāo)準(zhǔn)化與規(guī)范化
- 2024年山東圣翰財貿(mào)職業(yè)學(xué)院單招綜合素質(zhì)考試題庫含答案(綜合卷)
- 肝與膽病辨證課件
- 部編版語文七年級下冊第三單元大單元整體教學(xué)設(shè)計
- (2024年)建筑工程施工工藝
評論
0/150
提交評論