Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

1. Microsoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users.

group policy

change management policies

configuration management policies

Simple Network Management Protocol (SNMP)

2. When new policies are introduced into an organization, the culture is forced to change. This change entails requiring individuals to cease bad habits and adopt new ways to cope with risk.

True
False

3. ___________________ make use of baselines to identify changes in the behavior of the network.

Anomaly-based intrusion detection systems

Protocols

Authenticated configuration scanners

Misconfiguration remediation

4. The Gramm-Leach-Bliley Act (GLBA) was created to protect confidentiality and security of customer information. Thus, under GLBA, organizations are required to inform regulators quickly if any unauthorized access or breach has occurred. Consider this scenario: A bank teller accesses a customer account out of curiosity. What is best course of action following this event?

The bank should notify the regulator based on the threshold set for the how many records can be subject to unauthorized access.

The bank should notify the teller that she is to be terminated immediately and investigated for suspicious activity.

The bank should notify the regulator immediately because the teller has exhibited suspicious activity.

The bank should notify the regulator because it is evidence that a pervasive control weakness exists.

5. In order to build security policy implementation awareness across the organization, there should be ____________________ who partner with other team and departments to promote IT security through different communication channels.

many HR department personnel

numerous marketing department professionals

multiple executive supporters

several IT department specialists

6. __________________ is a term that denotes the way that a policy either diminishes business disruptions or facilitates the business's success.

Risk and control self-assessment

Business risk

Bolt-on

Compliance

7. While there are many ways that policy objectives and goals can be described, some techniques are more effective than others for persuading an organization to implement them. Which of the following is not one of the effective techniques for persuading people to follow policy objectives and goals?

giving an explanation how the policy will minimize business risk

explaining how the policy will guarantee that the business complies with laws and regulations

explaining how the policy will safeguard against or locate IT security threats

explaining the careful process of design and approval that went into creating the polices

8. A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives.

threat vector

target state

agent

communications plan

9. After management has created and agreed upon its policies, it must then determine how these policies will be implemented. Which of the following is not one the processes that line management will follow in order to make the new policies operational?

It will ensure that all members on the front-line team have received training.

It will take on the responsibility of being the point person for contact.

It will ensure that users with the most sensitive security access especially adhere to the policies.

It will apply the policies in an even and consistent manner.

10. During the process of developing a communications plan, it is necessary to ask the question, __________________.

"Who is communicating?"

"What is the intended message?"

"What is the target audience?"

"How is it communicated?"

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92866545

Have any Question?


Related Questions in Management Information System

Assignmentwrite a 5 to 7 page paper not including title and

Assignment Write a 5 to 7 page paper (not including title and reference pages) in which you examine a code of ethics for a professional organization, business, or government agency, and write a critique of it. In your pa ...

Singulation is the process by which an rfid reader

"Singulation" is the process by which an RFID reader identifies and communicates with a single RFID transponder. Two singulation methods are tree-walking and an Aloha MAC. Which method is preferable in a densly populated ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Security and privacy play an important role within an ea

Security and privacy play an important role within an EA program and its architecture. Please respond to the following in your own words: 1. What is your understanding of the role of security and privacy in the EA progra ...

Suppose that frames are 500 bytes long which includes 58

Suppose that frames are 500 bytes long which includes 58 bytes of overhead. Also assume that ACK frames are 64 bytes long. a) The transmission uses Stop-and-Wait ARQ. Let the transmission rate of the system be R where R= ...

Question onesuppose the following mib for a certain

Question One Suppose the following MIB for a certain enterprise BikesFun selling bikes and t-shirts. Draw request-response messages, as shown in figures 6.40 and 6.41 (chapter 6), to retrieve all columnar objects of the ...

Assessment instructionsfor this assessment you will explain

Assessment Instructions For this assessment, you will explain how to secure your applications and operating systems using various security tools. Use the suggested resources, the Capella library, and the Internet to rese ...

Management of itexercise - providing it assurance

Management of IT Exercise - Providing IT Assurance Policies: • Submissions made through a means other than the GeorgiaView (D2L) Dropbox will be ignored and earn a 0. • Submissions without your name stated above earn a 0 ...

Question - given that the money and human resources are

Question - Given that the money and human resources are ultimately limited, what can be done to improve the EFFICIENCY of the US healthcare system? Please answer this question from two perspectives: 1. What should (can) ...

Discussion briefly describe three 3 types of errors that

Discussion : Briefly describe three (3) types of errors that can occur in JavaScript. Determine which error you believe to be the most difficult to debug. Provide one (1) example of the error you believe to be the most d ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As