Questions 1-50 – Flashcards

Unlock all answers in this set

Unlock answers
question
Question ____ is the process of moving an organization toward its vision.
answer
Answer c. Strategic planning
question
Question A ____ deals with the preparation for and recovery from a disaster, whether natural or man-made.
answer
Answer d. disaster recovery plan
question
Question ____ is the process of examining, documenting, and assessing the security posture of an organization's information technology and the risks it faces.
answer
Answer c. Risk identification
question
Question The term ____ refers to a broad category of electronic and human activities in which an unauthorized individual gains access to the information an organization is trying to protect.
answer
Answer d. trespass
question
Question A Disaster Recovery Plan (DR plan) deals with identifying, classifying, responding to, and recovering from an incident.
answer
Answer b. False
question
Question ____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations.
answer
Answer a. Transference
question
Question Information assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states.
answer
Answer b. integrity
question
Question ____ hack systems to conduct terrorist activities through network or Internet pathways.
answer
Answer b. Cyberterrorists
question
Question Intellectual property (IP) includes trade secrets, copyrights, trademarks, and patents.
answer
Answer a. True
question
Question ____ ensures that only those with the rights and privileges to access information are able to do so.
answer
Answer c. Confidentiality
question
Question ____ (sometimes referred to as avoidance) is the risk control strategy that attempts to prevent the exploitation of a vulnerability.
answer
Answer a. Defense
question
Question A(n) ____ is used to anticipate, react to, and recover from events that threaten the security of information and information assets in an organization; it is also used to restore the organization to normal modes of business operations;
answer
Answer a. contingency plan
question
Question A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organization.
answer
Answer b. business impact analysis (BIA)
question
Question A ____ attack seeks to deny legitimate users access to services by either tying up a server's available resources or causing it to shut down.
answer
Answer b. DoS
question
Question A(n) ____ is a plan or course of action used by an organization to convey instructions from its senior management to those who make decisions, take actions, and perform other duties on behalf of the organization.
answer
Answer b. policy
question
Question ____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.
answer
Answer c. Mitigation
question
Question A(n) ____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.
answer
Answer a. incident
question
Question A ____ is a document that describes how, in the event of a disaster, critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site.
answer
Answer b. business continuity plan
question
Question An asset can be logical, such as a Web site, information, or data; or an asset can be physical, such as a person, computer system, or other tangible object.
answer
Answer a. True
question
Question ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.
answer
Answer b. Risk assessment
question
Question ____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.
answer
Answer b. Acceptance
question
Question The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe.
answer
Answer c. C.I.A. triangle
question
Question An enterprise information security policy (EISP) addresses specific areas of technology and contains a statement on the organization's position on each specific area.
answer
Answer b. False
question
Question The vision of an organization is a written statement of an organization's purpose.
answer
Answer b. False
question
Question A(n) ____ is an object, person, or other entity that is a potential risk of loss to an asset.
answer
Answer a. threat
question
Question Information assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction.
answer
Answer c. availability
question
Question Effective contingency planning begins with effective policy.
answer
Answer a. True
question
Question The first major business impact analysis task is to analyze and prioritize the organization's business processes based on their relationships to the organization's ____.
answer
Answer c. mission
question
Question Team leaders from the subordinate teams, including the IR, DR, and BC teams, should not be included in the CPMT.
answer
Answer b. False
question
Question The recovery time objective (RTO) downtime metric is the defined as the point in time to which lost systems and data can be recovered after an outage as determined by the business unit.
answer
Answer b. False
question
Question A weighted analysis table can be useful in resolving the issue of which business function is the most critical to the organization.
answer
Answer a. True
question
Question Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common goal of making the organization function to meet its objectives.
answer
Answer d. community of interest
question
Question The ____ is the period of time within which systems, applications, or functions must be recovered after an outage.
answer
Answer d. recovery time objective
question
Question The ____ is the point in time, determined by the business unit, from which systems and data can be recovered after an outage.
answer
Answer b. recovery point objective
question
Question What is a common approach used in the discipline of systems analysis and design to understand the ways systems operate and to chart process flows and interdependency studies?
answer
Answer c. systems diagramming
question
Question The ____ is used to collect information directly from the end users and business managers.
answer
Answer a. facilitated data-gathering session
question
Question The ____ job functions and organizational roles focus on protecting the organization's information systems and stored information from attacks.
answer
Answer d. information security management and professionals
question
Question A business impact analysis (BIA) identifies threats, vulnerabilities, and potential attacks to determine what controls can protect the information.
answer
Answer b. False
question
Question The final component to the CPMT planning process is to deal with ____.
answer
Answer a. budgeting for contingency operations
question
Question In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, promote the objectives of the CP project, and endorse the results that come from the combined effort.
answer
Answer a. champion
question
Question A manual alternative to the normal way of accomplishing an IT task might be employed in the event that IT is unavailable. This is called a ____.
answer
Answer c. work-around procedure
question
Question The ____ job functions and organizational roles focus on costs of system creation and operation, ease of use for system users, timeliness of system creation, and transaction response time.
answer
Answer c. information technology management and professionals
question
Question The elements required to begin the ____ process are a planning methodology; a policy environment to enable the planning process; an understanding of the causes and effects of core precursor activities, and access to financial and other resources.
answer
Answer a. contingency planning
question
Question In a CPMT, a(n) ____ leads the project to make sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed.
answer
Answer d. project manager
question
Question The last stage of a business impact analysis is prioritizing the resources associated with the ____, which brings a better understanding of what must be recovered first.
answer
Answer c. mission/business processes
question
Question One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business functions is a(n) ____.:
answer
Answer b. collaboration diagram
question
Question The ____ is an investigation and assessment of the impact that various events or incidents can have on the organization.
answer
Answer c. business impact analysis
question
Question To a large extent, incident response capabilities are part of a normal IT budget. The only area in which additional budgeting is absolutely required for incident response is the maintenance of ____.
answer
Answer d. redundant equipment
question
Question The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents, recovery from disasters, and reestablishment of operations for continuity.
answer
Answer d. contingency planning policy
question
Question Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware?
answer
Answer a. system logs
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New