QUESTION 1 A risk management strategy calls on information security professional
ID: 3694358 • Letter: Q
Question
QUESTION 1 A risk management strategy calls on information security professionals to know their organization's__________? QUESTION 2 True or False: According to Chinese General Sun Tzu (as quoted in the textbook), you should know the enemy and know yourself. True False QUESTION 3 System-specific policies can be organized into two general groups:______and_______ . QUESTION 4 What does ARPA stand for? QUESTION 5 True or False: The Federal Bureau of Investigation (FBI) is the federal agency responsible for signal intelligence and information system security of classified systems. QUESTION 6 True or False: The traditional system component of software can be broken into two components when viewed from an information security perspective: operating systems and security components. QUESTION 7 The____________ community of interest should have the best understanding of threats and attacks and often takes a leadership role in addressing risks. QUESTION 8 True or False: The National Security Agency (NSA) is responsible for the security of all national critical infrastructures. QUESTION 9 For information security purposes,______ are the systems that use, store, and transmit information. QUESTION 10 ____ security addresses the protection of individuals or groups authorized to access an organization. A. Personnel B. Personal C. Public D. Physical QUESTION 11 True or False: If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity. QUESTION 12 What is a type of law that addresses violations harmful to society and that is enforced by prosecution by the state? QUESTION 13 A(n) _______ addresses specific areas of technology, requires frequent updates, and contains a statement on the organization’s position on a specific issue. QUESTION 14 The second major undertaking involved in risk management, after risk identification, is_________. QUESTION 15 When individuals are assigned security labels for access to categories of information, they have acquired a(n)_______ . QUESTION 16 Risk identification is performed within a larger process of identifying and justifying risk controls, which is called________ . QUESTION 17________ are detailed statements of what must be done to comply with policy. QUESTION 18 When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n) ____ approach. A. top-down B. trickle down C. bottom-up D. executive led QUESTION 19________ are frequently codified as standards and procedures to be used when configuring or maintaining systems. QUESTION 20 True or False: Hardware networking components can be broken down into two subgroups when viewed from an information security perspective: Intranet components and Internet or DMZ components. QUESTION 21 Ownership or control of information is called the characteristic of _____. A. possession B. confidentiality C. integrity D. authenticity QUESTION 22 True or False: The National Security Agency (NSA) is the federal agency responsible for signal intelligence and information system security of classified systems. QUESTION 23 What is a type of law that represents all of the laws that apply to a citizen (or subject) of a jurisdiction? QUESTION 24 The ________ community of interest must ensure sufficient resources are allocated to the risk management process. QUESTION 25 _________ direct how issues should be addressed and technologies used.
Explanation / Answer
1. A risk management strategy calls on informationsecurity professionals to identify, classify, and prioritize the organizations information assets and then threat identification process begins, It is examined to identify vulonerabilitiesare found controlled and identified are accessed.
2. False
3. Managerial guidence and technical specifications.
4. AQdress and routing parameter area.
5. True
6. True
7. General management
8. False
9. Assets
10. public
11. false
12. civil law
13. security effective and succesful
14. Risk assesments
15. Security clearance
16. Risk magazine
17. Security policy standards
18. Top down
19. SysSps
20.True
21. A. possession
22. True
23. Michigan tax law
24. The information technology
25. policies
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.