Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following is NOT one of the five basic outcomes of information security governance? [1] A. Creating and promoting a culture that recognises

Which of the following is NOT one of the five basic outcomes of information security governance? [1]

A. Creating and promoting a culture that recognises the criticality of information and information security to the organisation.

B. Verifying that managements investment in information security is properly aligned with organisational strategies and the organisations risk environment.

C. Ensuring an increase in the share value for organisations.

D. Mandating and assuring that a comprehensive information security programme is developed and implemented.

9. The elements of a security programme include: [1]

A. Policy, programme management, risk management, personnel issues, hardware and software controls.

B. Policy, programme management, risk management, personnel issues, awareness and training and cryptography, which is the most important element.

C. Policy, programme management, risk management, awareness and training and cryptography, audit trails, identification and authentication, and personnel/user issues, the most important function.

D. Policy, programme management, risk management, awareness and training and cryptography, audit trails, identification and authentication, personnel/user issues, and security considerations in computer support and operations, the most important function.

10. Which of the following statements is false? [1]

A. Educational instruction tends to emphasise understanding of the what much more than the how of the concepts in information security.

B. An advantage of on-the-job training is that it is inexpensive and applicable to the task at hand.

C. The information security manager should develop information security policies, standards, guidelines and procedures and provide technical assistance to set up systems security.

D. An Information Security department can report to an Administrative Services department.

11. Identification of options; development of an action plan; approval of an action plan and identification of residual risk form part of:

A. risk assessment

B. risk acceptance

C. formulation of risk criteria

D. risk treatment

12. Which firewall is able to examine the application layer of network traffic and filter based on its header content rather than the traffic IP headers? [1]

A. application layer firewall

B. bastion host

C. dual-homed host

D. packet filtering firewall

13. A tool used by attackers and defenders to identify or fingerprint active computers on a network; the active ports and services on those computers; the functions and roles of machines and other useful information.

A. fingerprinting

B. footprinting

C. honey net

D. port scanner

14. Controls that remedy a circumstance or mitigate damage done during an incident are categorised as which of the following? [1]

A. preventative

D. deterrent

C. corrective

D. compensating

15. What are the two general approaches for controlling user authorisation for the use of a technology? [1]

A. profile lists and configuration tables

B. firewall rules and access filters

C. user profiles and filters

D. access control lists and capability tables

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managing Supply Chain and Operations An Integrative Approach

Authors: Thomas Foster, Scott E. Sampson, Cynthia Wallin, Scott W Webb

1st edition

132832402, 978-0132832403

More Books

Students also viewed these General Management questions