Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 1 A risk management strategy calls on information security professional

ID: 3694358 • Letter: Q

Question

QUESTION 1 A risk management strategy calls on information security professionals to know their organization's__________? QUESTION 2 True or False: According to Chinese General Sun Tzu (as quoted in the textbook), you should know the enemy and know yourself. True False QUESTION 3 System-specific policies can be organized into two general groups:______and_______ . QUESTION 4 What does ARPA stand for? QUESTION 5 True or False: The Federal Bureau of Investigation (FBI) is the federal agency responsible for signal intelligence and information system security of classified systems. QUESTION 6 True or False: The traditional system component of software can be broken into two components when viewed from an information security perspective: operating systems and security components. QUESTION 7 The____________ community of interest should have the best understanding of threats and attacks and often takes a leadership role in addressing risks. QUESTION 8 True or False: The National Security Agency (NSA) is responsible for the security of all national critical infrastructures. QUESTION 9 For information security purposes,______ are the systems that use, store, and transmit information. QUESTION 10 ____ security addresses the protection of individuals or groups authorized to access an organization. A. Personnel B. Personal C. Public D. Physical QUESTION 11 True or False: If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity. QUESTION 12 What is a type of law that addresses violations harmful to society and that is enforced by prosecution by the state? QUESTION 13 A(n) _______ addresses specific areas of technology, requires frequent updates, and contains a statement on the organization’s position on a specific issue. QUESTION 14 The second major undertaking involved in risk management, after risk identification, is_________. QUESTION 15 When individuals are assigned security labels for access to categories of information, they have acquired a(n)_______ . QUESTION 16 Risk identification is performed within a larger process of identifying and justifying risk controls, which is called________ . QUESTION 17________ are detailed statements of what must be done to comply with policy. QUESTION 18 When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n) ____ approach. A. top-down B. trickle down C. bottom-up D. executive led QUESTION 19________ are frequently codified as standards and procedures to be used when configuring or maintaining systems. QUESTION 20 True or False: Hardware networking components can be broken down into two subgroups when viewed from an information security perspective: Intranet components and Internet or DMZ components. QUESTION 21 Ownership or control of information is called the characteristic of _____. A. possession B. confidentiality C. integrity D. authenticity QUESTION 22 True or False: The National Security Agency (NSA) is the federal agency responsible for signal intelligence and information system security of classified systems. QUESTION 23 What is a type of law that represents all of the laws that apply to a citizen (or subject) of a jurisdiction? QUESTION 24 The ________ community of interest must ensure sufficient resources are allocated to the risk management process. QUESTION 25 _________ direct how issues should be addressed and technologies used.

Explanation / Answer

1. A risk management strategy calls on informationsecurity professionals to identify, classify, and prioritize the organizations information assets and then threat identification process begins, It is examined to identify vulonerabilitiesare found controlled and identified are accessed.

2. False

3. Managerial guidence and technical specifications.

4. AQdress and routing parameter area.

5. True

6. True

7. General management

8. False

9. Assets

10. public

11. false

12. civil law

13. security effective and succesful

14. Risk assesments

15. Security clearance

16. Risk magazine

17. Security policy standards

18. Top down

19. SysSps

20.True

21. A. possession

22. True

23. Michigan tax law

24. The information technology

25. policies

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote