Beruflich Dokumente
Kultur Dokumente
b.
incident damage assessment
Correct Answer:
b.
incident damage assessment
Question 2
Correct Answer:
c.
tactical
Question 3
c.
analysis
Correct Answer:
c.
analysis
Question 4
Which of the following is a tool that can be useful in resolving the issue of
what business function is the most critical?
Answer
Selected Answer:
a.
weighted analysis tool
Correct Answer:
a.
weighted analysis tool
Question 5
Which of the following set the direction and scope of the security process and
provide detailed instruction for its conduct?
Answer
Selected Answer:
a.
technical controls
Correct Answer:
d.
managerial controls
Question 6
What are the two general methods for implementing technical controls?
Answer
Selected Answer:
a.
access control lists and configuration rules
Correct Answer:
a.
access control lists and configuration rules
Question 7
b.
identify resource requirements
Correct Answer:
c.
prioritize resources associated with the business
processes
Question 8
d.
can suffer from poor policy enforcement
Correct Answer:
d.
can suffer from poor policy enforcement
Question 9
Answer
Question
usually a documented way to circumvent
controls or take advantage of weaknesses in
control systems
Correct
Match
i.
exploit
Selected
Match
a.
operational
controls
the process of moving an organization towards
its vision by accomplishing its mission
c.
strategic
planning
c.
strategic
planning
h.
i.
attack
exploit
j.
j.
risk
assessment
g.
technical
controls
b.
data owner
a.
operational
controls
risk
assessment
f.
risk
managemen
t
d.
threat agent
g.
technical
controls
Question 10
d.
h.
e.
plan-driven
Answer
Question
Correct
Match
f.
Selected
Match
g.
slack time
j.
identification authenticatio
n
d.
d.
project
project
management management
c.
scope creep
a.
c.
scope creep
f.
authorization identification
i.
information
security
h.
organizing
e.
Operations
security
j.
i.
information
security
h.
organizing
e.
Operations
security
a.
authenticatio authorization
n
b.
b.
integrity
integrity
Question 11
b.
policy
Correct Answer:
b.
policy
Question 12
Correct Answer:
c.
All workers operate at approximately the same level of
efficiency
Question 13
b.
Quality
Correct Answer:
c.
Technology
Question 14
In which model in the SecSDLC does the work products of each phase fall
into the next phase to serve as its starting point?
Answer
Selected Answer:
b.
waterfall
Correct Answer:
b.
waterfall
Question 15
Correct
Answer:
a.
It duplicates computing resources, peripherals, phone
systems, applications, and workstations.
a.
It duplicates computing resources, peripherals, phone
systems, applications, and workstations.
Question 16
Which of the following is the process that develops, creates, and implements
strategies for the accomplishment of objectives?
Answer
Selected Answer:
a.
planning
Correct Answer:
a.
planning
Question 17
c.
people
Correct Answer:
c.
people
Question 18
Correct
Answer:
Question 19
d.
An InfoSec project management assessment from an
outside consultant
b.
An InfoSec risk management methodology
In the WBS approach, the project plan is first broken down into tasks placed
on the WBS task list. The minimum attributes that should be identified for
each task include all but which of the following?
Answer
Selected
Answer:
a.
The common or specialized skills needed to perform the
task
Correct Answer:
d.
The number of people and other resources needed for
each task
Question 20
b.
mission statement
Correct Answer:
b.
mission statement