Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assurance is the process of examining a computer product or system with respect to certain criteria.

2. Problems with providing strong computer security involve only the design phase.

3. IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.

4. To ensure that a suitable level of security is maintained, management must follow up the implementation with an evaluation of the effectiveness of the security controls.

MULTIPLE CHOICES QUESTIONS

5.      __________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A.  Availability        C.  System Integrity

B.  Privacy              D.  Data Integrity

Answer

6.      Security classes are referred to as __________.

A.     security clearances         B.  security classifications

C.      security levels              D.  security properties

Answer

7.      __________ ensures that critical assets are sufficiently protected in a cost-effective manner.

A.  IT control                    B.  IT security management

C.  IT discipline                 D.  IT risk implementations

Answer

8.      The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A.   risk register                   B. corporate security policy

c.   vulnerability source        D. threat assessment

Answer

9.      Which of the following supports the Defense-in-depth strategy?

A.  Abstraction            B. Data Hiding

C   Layering               D. Encryption

Answer

10.  The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.

A.    Access

B.     Asset management

C.     Compliance

D.    Business continuity management

Answer

11.  Which of the following is not a security architecture framework?

A.    Sherwood Applied  Business Security Architecture (SABSA)

B.     NIST Special publication 800-53

C.     ISO 27001 & 27002

D.    Open Web Application Security Project (OWASP)

Answer

12.  Which security management is considered complimentary to ISO/27001 & 20072

A.    SABA

B.     COBIT

C.     NIST Special publication 800-53

D.    OWASP

Answer

13.  The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.

A.    asset management

B.     business continuity management

C.     information security incident management

D.    physical and environmental security

Answer 

FILL-IN THE BLANK QUESTIONS

14. A loss of _________ is the disruption of access to or use of information or an information system.

Answer

15.  A subject is said to have a security _________ of a given level.

Answer

16.  ISO details a model process for managing information security that comprises the following steps:  plan, do, ________, and act.

Answer

17.  A _________ on an organization's IT systems identifies areas needing treatment.

Answer: Risk Assessment

Answer Table

True/False

Answer

1

 

2

 

3

 

4

 

Multiple Choices

 

5

 

6

 

7

 

8

 

9

 

10

 

11

 

12

 

13

 

Short Answer

 

14

 

15

 

16

 

17

 

 SHORT ANSWER QUESTIONS

18.  Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

Answer:

19.  The necessity of the "no read up" rule for a multilevel security is fairly obvious. What is the importance of the "no write down" rule?

 Answer

20.  List and briefly define the five alternatives for treating identified risks.

Answer:

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91696098
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Pablo bought some rural property in oconee county that is

Pablo bought some rural property in Oconee County that is rumored to be part of an expansion of the Epps Bridge Center phenomenon. The developer of the party told him that the property could triple in value under the exp ...

Please help me with the assignment and describe your

Please help me with the assignment and describe your answer. Consider the following random sample of data: -1, 3, -2, -9, -3, 3, -5, -3, 8, 86 a) What is the mean of the sample data? Round your response to at least 2 dec ...

In a software design meeting in your company your manager

In a software design meeting in your company, your manager says that one of the most important engines of the Record Keeping System you are developing is the Index Sorting Engine. Your coworker quickly jumps in and says ...

On microsoft word what would be the advantage of using the

On Microsoft word, what would be the advantage of using the dialog box over setting various tabs directly on the ruler line? In what types of typing tasks would you find using the ruler line helpful?

Question suppose you want to back up a huge file to a cd-r

Question : Suppose you want to back up a huge file to a CD-R. You can do this by splitting the file into smaller pieces and backup up those pieces separately. Write a utility program named FileSplitter that splits a larg ...

Question individual project - submit to the unit 3 ip

Question: Individual Project - Submit to the Unit 3 IP Area This part of the assignment is FOR GRADING for this week. This assignment is a document addressing security and should be submitted to the week's individual dro ...

Select an appropriate data structure for each problem below

Select an appropriate data structure for each problem below. For each, write the name of the type of each data structure (queue, for example). Declare the structure using C code, and draw a picture of the structure. dict ...

A string in c is simply an array of characters with the

A string in C++ is simply an array of characters with the null character(\0) used to mark the end of the string. C++ provides a set of string handling function in as well as I/O functions in . With the addition of the ST ...

Compare remote authentication dial-in user service radius

Compare Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access-Control System Plus (TACACS+).

Question unless otherwise stated answer in complete

Question: Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As