Information Security Strategy Standards Flashcards

1
Q

With its rapidly growing level of business, a company wants a process-based approach for establishing an information security management system.

Which standard should the company use for this purpose?

  1. HIPAA
  2. ISO 27001
  3. PCI DSS
  4. Six Sigma
A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization is seeking to enhance its information security measures. The organization wants guidelines for the integration of information security into operational plans.

Which standard provides these guidelines?

  1. ISO 27001
  2. PCI DSS
  3. ISO 9001
  4. Six Sigma
A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization that operates completely within the U.S. needs guidelines for creating a disaster recovery plan to restore information systems after an attack.

What should this organization use to obtain the needed guidelines?

  1. ISO 9001
  2. IEEE 802
  3. NIST Framework
  4. Six Sigma
A

NIST Framwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A business owner is working on bolstering information security and is especially concerned about protecting user identities.

Which tool should the business owner use to address this concern?

  1. Peer-to-peer architecture
  2. System auditing
  3. Employee education
  4. Identity management
A

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cross-functional team is working with a vendor to develop and implement information system policies in response to the growing use of customer information and networking within business operations. The team is currently addressing concerns about unauthorized access to stored customer information.

Which type of controls should this team create?

  1. Software
  2. Computer operations
  3. Data security
  4. Hardware
A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A small business owner has concerns about information security but is not sure where to begin.

What should this business owner do first?

  1. Educate employees on the dangers of phishing attacks
  2. Install an intrusion detection system
  3. Implement administrative controls
  4. Conduct a risk assessment
A

Conduct a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company recently experienced an internal information security breach, but the company is reluctant to report the computer crime.

Which reason explains why the company is reluctant to report the crime?

  1. The extent of the damage is not yet known.
  2. The crime involves employees.
  3. The vulnerability has not yet been fixed.
  4. The vulnerability was unknown.
A

The crime involves employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A financial firm serving tens of millions of clients was recently the target of a cybercrime attack. Valuable company data and sensitive customer data were copied, resulting in harm to both customers and the company.

What is a societal consequence related to this large-scale attack?

  1. Shift away from business technology use
  2. Higher prices for goods and services
  3. Reduced labor availability
  4. Loss of public trust
A

Loss of public trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A national retailer reported that computer hackers were able to penetrate their information system and steal sensitive company and customer data, potentially affecting millions of customers and threatening business operations.

Which societal consequence is expected for this large-scale attack?

  1. Reduced labor availability
  2. Shift away from business technology use
  3. More stringent regulatory oversight
  4. Higher prices for goods and services
A

More stringent regulatory oversight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company is updating its information security policies after several updates and changes have been made to its enterprise information system. One component of the new policies indicates that management is only allowed access to employee data that is necessary and directly related to a defined business task.

Which ethical concern is addressed by the policy?

  1. Justice
  2. Transparency
  3. Due process
  4. Privacy
A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An online retailer has experienced rapid growth over the past several years and has decided to revisit its information security policies. Among many changes, one aspect indicates that a specific team will be established to handle internal policy disputes or questions of conduct.

Which ethical concern is addressed by this aspect of the new policies?

  1. Human welfare
  2. Justice
  3. Due process
  4. Proportionality
A

Due Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly