CHAPTER 15 Flashcards

1
Q

To ensure that a suitable level of security is maintained, management
must follow up the implementation with an evaluation of the effectiveness of the security controls

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Management controls refer to issues that management needs to address

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational controls range from simple to complex measures that work
together to secure critical and sensitive data, information, and IT systems functions

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detection and recovery controls provide a means to restore lost
computing resources

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Water damage protection is included in security controls

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All controls are applicable to all technologies

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical access or environmental controls are only relevant to areas
housing the relevant equipment.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Once in place controls cannot be adjusted, regardless of the results of
risk assessment of systems in the organization

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls may vary in size and complexity in relation to the

organization employing them.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is likely that the organization will not have the resources to
implement all the recommended controls

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The selection of recommended controls is not guided by legal
requirements.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The recommended controls need to be compatible with the

organization’s systems and policies

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The implementation phase comprises not only the direct
implementation of the controls, but also the associated training and general security awareness programs for the organization

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Appropriate security awareness training for all personnel in an
organization, along with specific training relating to particular systems and controls, is an essential component in implementing controls

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IT security management process ends with the implementation of
controls and the training of personnel

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

A. Configuration management control
B. IT security management
C. Detection and recovery control
D. Security compliance

A

IT security management

17
Q

An IT security ________ helps to reduce risks.
A. control B. safeguard
C. countermeasure D. all of the above

A

all of the above

18
Q

_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission.
A. Management B. Technical
C. Preventative D. Supportive

A

Management

19
Q

_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.
A. Preventative B. Supportive
C. Operational D. Detection and recovery

A

Supportive

20
Q

________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.
A. Technical B. Preventative
C. Detection and recovery D. Management

A

Detection and recovery

21
Q

A contingency plan for systems critical to a large organization would be _________ than that for a small business.
A. smaller, less detailed B. larger, less detailed
C. larger, more detailed D. smaller, more detailed

A

larger, more detailed

22
Q

Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.
A. cost analysis B. cost-benefit analysis
C. benefit analysis D. none of the above

A

cost-benefit analysis

23
Q

An IT security plan should include details of _________.
A. risks B. recommended controls
C. responsible personnel D. all of the above

A

all of the above

24
Q

The implementation process is typically monitored by the organizational ______.
A. security officer B. general counsel
C. technology officer D. human resources

A

security officer

25
Q
The follow-up stage of the management process includes \_\_\_\_\_\_\_\_\_.
			A.  maintenance of security controls
			B.  security compliance checking
			C.  incident handling
			D.  all of the above
A

all of the above

26
Q

The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.
A. access B. asset management
C. compliance D. business continuity management

A

compliance

27
Q

The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption.
A. asset management
B. business continuity management
C. information security incident management
D. physical and environmental security

A

business continuity management

28
Q
Identification and authentication is part of the \_\_\_\_\_\_\_ class of security controls.
			A.  technical			B.  operational
			C.  management		D.  none of the above
A

technical

29
Q

Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process.
A. management B. security awareness and training
C. maintenance D. all of the above

A

management

30
Q

Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks.
A. security compliance B. maintenance
C. incident handling D. program management

A

maintenance