




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
安全管理習(xí)題講解第1頁/共54頁QUIZ2Accordingtogovernmentaldataclassificationlevels,howwouldanswerstotestsandhealthcareinformationbeclassified?AConfidentialBSensitivebutunclassifiedCPrivateDUnclassifiedB第2頁/共54頁第3頁/共54頁QUIZ3.Accordingtoprivatesectordataclassificationlevels,howwouldsalarylevelsandmedicalinformationbeclassified?AConfidentialBPublicCPrivateDSensitiveC第4頁/共54頁QUIZ4Whichofthenextarestepsofacommondevelopmentprocessofcreatingasecuritypolicy,standardsandprocedures?Adesign,development,publication,coding,testingBdesign,evaluation,approval,publication,implementationCinitialandevaluation,development,approval,publication,implementation,maintenanceDfeasibility,development,approval,implementation,integrationC第5頁/共54頁5Whatisthemainpurposeofasecuritypolicy?AtotransfertheresponsibilityfortheinformationsecuritytoallusersoftheorganizationBtoprovidedetailedstepsforperformingspecificactionsCtoprovideacommonframeworkforalldevelopmentactivitiesDtoprovidethemanagementdirectionandsupportforinformationsecurityD第6頁/共54頁6Whichofthefollowingdepartmentmanagerswouldbebestsuitedtooverseethedevelopmentofaninformationsecuritypolicy?ASecurityadministrationBHumanresourcesCBusinessoperationsDInformationsystemsC第7頁/共54頁7Whichofthefollowingisnotaresponsibilityofaninformationowner?ARunningregularbackupsandperiodicallytestingthevalidityofthebackupdata.BDelegatetheresponsibilityofdataprotectiontodatacustodians.CPeriodicallyreviewtheclassificationassignmentsagainstbusinessneeds.DDeterminewhatlevelofclassificationtheinformationrequires.A第8頁/共54頁8Whichofthefollowingisnotagoalofintegrity?APreventionofthemodificationofinformationbyunauthorizedusers.BPreventionoftheunauthorizedorunintentionalmodificationofinformationbyauthorizedusers.CPreventionofthemodificationofinformationbyauthorizedusers.DPreservationoftheinternalandexternalconsistency.C第9頁/共54頁9Whydomanyorganizationsrequireeveryemployeetotakeamandatoryvacationofaweekormore?AToleadtogreaterproductivitythroughabetterqualityoflifefortheemployee.BToreducetheopportunityforanemployeetocommitanimproperorillegalact.CToprovidepropercrosstrainingforanotheremployee.DToallowmoreemployeestohaveabetterunderstandingoftheoverallsystem.B第10頁/共54頁10Whichofthefollowingwouldbestrelatetoresourcesbeingusedonlyforintendedpurposes?AAvailabilityBIntegrityCReliabilityDConfidentialityA第11頁/共54頁11Securityofcomputer-basedinformationsystemsiswhichofthefollowing?AtechnicalissueBmanagementissueCtrainingissueDoperationalissueB第12頁/共54頁12Whichofthefollowingwouldbethefirststepinestablishinganinformationsecurityprogram?ADevelopmentandimplementationofaninformationsecuritystandardsmanual.BDevelopmentofasecurityawareness-trainingprogramforemployees.CPurchaseofsecurityaccesscontrolsoftware.DAdoptionofacorporateinformationsecuritypolicystatement.D第13頁/共54頁13Whichofthefollowingtasksmaybeperformedbythesamepersoninawell-controlledinformationprocessingfacility/computercenter?AComputeroperationsandsystemdevelopmentBSystemdevelopmentandchangemanagementCSystemdevelopmentandsystemsmaintenanceDSecurityadministrationandchangemanagementC第14頁/共54頁14Computersecurityshouldnot:ACoverallidentifiedrisks.BBecost-effective.CBeexaminedinbothmonetaryandnon-monetaryterms.DBeproportionatetothevalueofITsystems.A第15頁/共54頁15Whichofthefollowingismostconcernedwithpersonnelsecurity?AManagementcontrolsBHumanresourcescontrolsCTechnicalcontrolsDOperationalcontrolsD第16頁/共54頁16Whichofthefollowingismostlikelygiventheresponsibilityofthemaintenanceandprotectionofthedata?ASecurityadministratorBUserCDatacustodianDDataowner
C第17頁/共54頁17Whoisresponsibleforprovidingreportstotheseniormanagementontheeffectivenessofthesecuritycontrols?AInformationsystemssecurityprofessionalsBDataownersCDatacustodiansDInformationsystemsauditorsD第18頁/共54頁18Riskmitigationandriskreductioncontrolscanbeofwhichofthefollowingtypes?Apreventive,detective,orcorrectiveBAdministrative,operationalorlogicalCdetective,correctiveDpreventive,correctiveandadministrativeA第19頁/共54頁19Whichofthefollowingwouldbestclassifyasamanagementcontrol?AReviewofsecuritycontrolsBDocumentationCPersonnelsecurityDPhysicalandenvironmentalprotectionA第20頁/共54頁20WhatisthegoaloftheMaintenancephaseinacommondevelopmentprocessofasecuritypolicy?AtopresentdocumenttoapprovingbodyBtowriteproposaltomanagementthatstatestheobjectivesofthepolicyCpublicationwithintheorganizationDtoreviewofthedocumentonthespecifiedreviewdateD第21頁/共54頁21Whichapproachtoasecurityprogrammakessurethatthepeopleactuallyresponsibleforprotectingthecompany'sassetsaredrivingtheprogram?AThetop-downapproachBThebottom-upapproachCThetechnologyapproachDTheDelphiapproachA第22頁/共54頁22ThepreliminarystepstosecurityplanningincludeallofthefollowingEXCEPTwhichofthefollowing?ADeterminealternatecoursesofactionBEstablishasecurityauditfunction.CEstablishobjectives.DListplanningassumptions.B第23頁/共54頁23ITsecuritymeasuresshould:ABetailoredtomeetorganizationalsecuritygoals.BMakesurethateveryassetoftheorganizationiswellprotected.CNotbedevelopedinalayeredfashion.DBecomplexA第24頁/共54頁24Whichofthefollowingembodiesallthedetailedactionsthatpersonnelarerequiredtofollow?ABaselinesBProceduresCGuidelinesDStandardsB第25頁/共54頁25WhichofthefollowingshouldNOTbeaddressedbyemployeeterminationpractices?ADeletionofassignedlogon-IDandpasswordstoprohibitsystemaccess.BReturnofaccessbadges.CEmployeebondingtoprotectagainstlossesduetotheft.DRemovaloftheemployeefromactivepayrollfiles.C第26頁/共54頁26Preservationofconfidentialityinformationsystemsrequiresthattheinformationisnotdisclosedto:AAuthorizedpersonsandprocessesBUnauthorizedpersons.CUnauthorizedpersonsorprocesses.DAuthorizedpersonC第27頁/共54頁27Whichofthefollowingstatementspertainingtoquantitativeriskanalysisisfalse?AItrequiresahighvolumeofinformationBItinvolvescomplexcalculationsCItcanbeautomatedDItinvolvesalotofguessworkD第28頁/共54頁28Allexceptwhichofthefollowarenotusedtoensureintegrity?AcompliancemonitoringservicesBintrusiondetectionservicesCcommunicationssecuritymanagementDfirewallservicesA第29頁/共54頁29WhichofthefollowingwouldviolatetheDueCareconcept?ALatestsecuritypatchesforserversonlybeinginstalledonceaweekBNetworkadministratornottakingmandatorytwo-weekvacationasplannedCSecuritypolicybeingoutdatedDDataownersnotlayingoutthefoundationofdataprotectionD第30頁/共54頁30Whatdoes"residualrisk"mean?AWeaknessofanassetswhichcanbeexploitedbyathreatBRiskthatremainsafterriskanalysishashasbeenperformedCTheresultofunwantedincidentDThesecurityriskthatremainsaftercontrolshavebeenimplementedD第31頁/共54頁31Whichofthefollowingquestionsshouldanyusernotbeabletoanswerregardingtheirorganization'sinformationsecuritypolicy?AWhereistheorganization'ssecuritypolicydefined?BWhoisinvolvedinestablishingthesecuritypolicy?CWhataretheactionsthatneedtobeperformedincaseofadisaster?DWhoisresponsibleformonitoringcompliancetotheorganization'ssecuritypolicy?C第32頁/共54頁32Inaproperlysegregatedenvironment,whichofthefollowingtasksiscompatiblewiththetaskofsecurityadministrator?ADataentryBSystemsprogrammingCQualityassuranceDApplicationsprogrammingC第33頁/共54頁33Themajorobjectiveofsystemconfigurationmanagementiswhichofthefollowing?AsystemmaintenanceBsystemtrackingCsystemstabilityDsystemoperationsC第34頁/共54頁34Inanorganization,anInformationTechnologysecurityfunctionshould:ABeindependentbutreporttotheInformationSystemsfunction.BBeleadbyaChiefSecurityOfficerandreportdirectlytotheCEO.CReportdirectlytoaspecializedbusinessunitsuchaslegal,corporatesecurityorinsurance.DBeafunctionwithintheinformationsystemsfunctionofanorganization.B第35頁/共54頁35Whoshouldmeasuretheeffectivenessofsecurityrelatedcontrolsinanorganization?AthecentralsecuritymanagerBthelocalsecurityspecialistCthesystemsauditorDthebusinessmanagerC第36頁/共54頁36WhatisadifferencebetweenQuantitativeandQualitativeRiskAnalysis?Afullyqualitativeanalysisisnotpossible,whilequantitativeisBquantitativeprovidesformalcost/benefitanalysisandqualitativenotCthereisnodifferencebetweenqualitativeandquantitativeanalysisDqualitativeusesstrongmathematicalformulasandquantitativenotB第37頁/共54頁37HowisAnnualizedLossExpectancy(ALE)derivedfromatreat?AAROx(SLE-EF)BSLExAROCSLE/EFDAVxEFB第38頁/共54頁38Onepurposeofasecurityawarenessprogramistomodify:Aattitudesofemployeeswithsensitivedata.Bcorporateattitudesaboutsafeguardingdata.Cemployee'sattitudesandbehaviors.Dmanagement'sapproach.C第39頁/共54頁39Controlsareimplementedto:AeliminateriskandreducethepotentialforlossBmitigateriskandeliminatethepotentialforlossCeliminateriskandeliminatethepotentialforlossDmitigateriskandreducethepotentialforlossD第40頁/共54頁40Whoshoulddecidehowacompanyshouldapproachsecurityandwhatsecuritymeasuresshouldbeimplemented?ATheinformationsecurityspecialistBAuditorCSeniormanagementDDataownerC第41頁/共54頁41Whichofthefollowingistheweakestlinkinasecuritysystem?APeopleBCommunicationsCHardwareDSoftwareA第42頁/共54頁42ISO17799isastandardfor:AInformationSecurityManagementBImplementationandcertificationofbasicsecuritymeasuresCCertificationofpublickeyinfrastructuresDEvaluationcriteriaforthevalidationofcryptographicalgorithmsA第43頁/共54頁43Whoofthefollowingisresponsibleforensuringthatpropercontrolsareinplacetoaddressintegrity,confidentiality,andavailabilityofITsystemsanddata?ABusinessandfunctionalmanagersBChiefinformationofficerCITSecuritypractitionersDSystemandinformationownersD第44頁/共54頁44Relatedtoinformationsecurity,theguaranteethatthemessagesentisthemessagereceivedisanexampleofwhichofthefollowing?AintegrityBidentityCavailabilityDconfidentialityA第45頁/共54頁45WhichoneofthefollowingrepresentsanALEcalculation?AassetvaluexlossexpectancyBactualreplacementcost-proceedsofsalvageCgrosslossexpectancyxlossfrequencyDsinglelossexpectancyxannualizedrateofoccurrenceD第46頁/共54頁46WhichofthefollowingchoicesisNOTpartofasecuritypolicy?AdescriptionofspecifictechnologiesusedinthefieldofinformationsecurityBdefinitionofoverallstepsofinformationsecurityandtheimportanceofsecurityCstatementofmanagementintend,supportingthegoalsandprinciplesofinformationsecurityDdefinitionofgeneralandspecificresponsibilitiesforinformationsecuritymanagementA第47頁/共54頁47Whichofthefollowingstatementspertainingtoasecuritypolicyisincorrect?AItmustbeflexibletothechangingenvironment.BItsmainpurposeistoinformtheusers,administratorsandmanagersoftheirobligatoryrequirementsforprotectingtechnologyandinformationas
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 戰(zhàn)略合作委托代理運(yùn)輸合同
- 銷售代理合同模板
- 標(biāo)準(zhǔn)個(gè)人居間代理合同模板
- 超市兼職員工勞動(dòng)合同范本
- 智能家居定制合同
- 技術(shù)服務(wù)合同意向協(xié)議書
- 食品進(jìn)出口合同范本
- 家具維修與家庭生活習(xí)慣改變考核試卷
- 地震勘探儀器的采購(gòu)與供應(yīng)鏈管理策略考核試卷
- 木地板行業(yè)人力資源管理與培訓(xùn)考核試卷
- 生物產(chǎn)品檢驗(yàn)檢疫基礎(chǔ)知識(shí)單選題100道及答案
- 江蘇省中職《英語》學(xué)業(yè)水平考試備考試題集(含歷年真題)
- 2025年合伙型公司新合伙人加入?yún)f(xié)議
- 2025年安全員之C證(專職安全員)考試題庫(kù)
- 2025城市商鋪買賣合同書
- 2025年春新北師大版物理八年級(jí)下冊(cè)課件 第六章 質(zhì)量和密度 第一節(jié) 物體的質(zhì)量及其測(cè)量
- 2024全國(guó)各省高考詩歌鑒賞真題及解析
- 《價(jià)值觀培訓(xùn)》課件
- 《臨床科研思維》課件
- GA/T 761-2024停車庫(kù)(場(chǎng))安全管理系統(tǒng)技術(shù)要求
- 《設(shè)施節(jié)水灌溉技術(shù)》課件
評(píng)論
0/150
提交評(píng)論