Ask Computer Engineering Expert

Q1. The aim of ____ is to maintain an optimum and secure relationship between each of the company's business processes and their respective information security functions.

a. formal governance
b. informal governance
c. formal auditing
d. formal planning

Q2. ____ bundles mutually supporting government initiatives into a single coordinated effort to ensure the security of cyberspace and includes the establishment of a coordinated national capability to identify and remediate computer vulnerabilities.

a. CHCI, 2008
b. CCNI, 2008
c. CNCI, 2008
d. CICN, 2008

Q3. In order for a defense to be effective, all of the requisite ____ have to be in place and properly coordinated.

a. assets
b. intrusions
c. countermeasures
d. backup controls

Q4. A(n) ____ that only reflects the focus and interests of a single field will almost certainly have exploitable holes in it.

a. offense
b. defense
c. control
d. mitigation

Q5. The ____ of a piece of information might be derived from the importance of the idea, or the criticality of the decision, or it can represent simple things like your bank account number.

a. value
b. cost
c. effectiveness
d. assessment

Q6. Meaningful evidence to support operational risk analysis and patch management processes is typically derived from the results of ____ testing.

a. operation
b. penetration
c. application
d. network

Q7. The ____ professional gathers evidence from any computers or digital media that might be implicated in the wrongdoing and supports any legal or regulatory action.

a. security compliance
b. risk management
c. incident
d. digital forensics

Q8. The formal assurance that evidence has passed from agency to agency without tampering is known as the ____.

a. chain of review
b. chain of care
c. chain of custody
d. chain of control

Q9. The ____ is typically responsible for establishing the physical security program, which involves the steps to align the practices of the physical security program with the overall security goals of the organization.

a. IT security compliance professional
b. IT operations professional
c. digital forensics professional
d. IT security professional

Q10. Incident management has both an electronic and a physical focus to it.

a. True
b. False

Q11. ____ are data that can be used to identify a single individual.

a. Logical security controls
b. Personally identifiable information
c. Virtual security controls
d. Permanent security controls

Q12. The ____ is responsible for ensuring that Personally Identifiable Information (PII) is protected.

a. certification specialist
b. risk specialist
c. privacy specialist
d. subject matter expert

Q13. The CIO is accountable for protecting data and information from harm caused by natural events, like earthquakes.

a. True
b. False

Q14. The ____ oversees the work of the other information security professionals and typically develops the policies for the information security function.

a. security architect
b. CIO
c. ISO
d. security engineer

Q15. The ____ ensures the enterprise's compliance with all relevant contracts, stands, laws or regulations.

a. SCO
b. ISO
c. CIO
d. SSO

Q16. ____ is the process of placing a coherent set of countermeasures to mitigate all identified risks based on asset vulnerability and identified threats.

a. Threat management
b. Risk management
c. Profile management
d. Project management

Q17. The specific organization-wide approach to security is known as the ____.

a. security foundation
b. security solution
c. security strategy
d. security policy

Q18. The SCO reports any emerging threats to the role responsible for developing security controls, typically the CIO.

a. True
b. False

Q19. The coordination and control process must maintain the traceability between each ____ and the purposes of the generic recommendation it implements.

a. individual work instruction
b. group work instruction
c. individual task
d. group task

Q20. The aim of any ____ process is to define the set of work instructions that have the greatest chance of accomplishing the purposes of the recommendation.

a. design
b. tailoring
c. build
d. manage

Q21. ____ give the implementation process the required flexibility.

a. Tasks
b. Roles
c. Work instructions
d. Work roles

Q22. In practice, there are likely to be instances where the situation just doesn't fit the recommendations of the EBK.

a. True
b. False

Q23. The roles and their asosciated competencies are broken down into functions. ____ functions are those that relate to the conceptualization and development of security-related functionality.

a. Manage
b. Implement
c. Design
d. Evaluate

Q24. All of the behaviors that the creators of the EBK deemed necessary to ensure fundamentally proper security were categorized into ____ competency areas.

a. 10
b. 12
c. 14
d. 16

Q25. The evaluation plan has to specify the provisions to assure the continuing ____ of the overall security process.

a. compliance
b. renewal
c. trustworthiness
d. revision

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92369913
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As