IS3110 CHAP 3 Flashcards
FISMA requires federal agencies to protect IT systems and data. How often should compliance be audited by an external organization?
- Never
- Quarterly
- Annually
- Every three years
Annually
What law applies to organizations handling health care information?
- SOX
- GLBA
- FISMA
- HIPAA
HIPAA
CEO’s and CFO’s can go to jail if financial statements are inaccurate. What law is this from?
- SOX
- GLBA
- FISMA
- HIPAA
HIPAA
What law requires schools and libraries to limit offensive content on their computers?
- FERPA
- HIPAA
- CIPA
- SSCP
CIPA
Employees in some companies are often required to take an annual vacation of at least five days. The purpose is to reduce fraud and embezzlement. What is this called?
- Job rotation
- Mandatory vacation
- Separation of duties
- Due diligence
Mandatory vacation
Fiduciary refers to a relationship of trust.
TRUE OR FALSE
TRUE
Merchants that handle credit cards are expected to implement data security. What standard should they follow?
- GAISP
- CMMI
- COBIT
- PCI DSS
PCI DSS
The National Institute of Standards and Technology published Special Publication 800-30. What does this cover?
- Risk management
- Maturity levels
- A framework of good practices
- Certification and accreditation
Risk management
The COBIT framework is organized into four IT domains and 34 IT processes. Which one covers strategy and tactics?
- Plan and Organize
- Acquire and Implement
- Deliver and Support
- Monitor and Evaluate
Plan and Organize
A basic principle of this standard is summarized with four sentences: Business requirements drive investments in IT resources. IT resources are used by IT processes. IT processes deliver enterprise information. Enterprise information responds to business requirements. What is this standard?
- COBIT
- ITIL
- GAISP
- CMMI
COBIT
Which of the following ISO standards can be used to verify that an organization meets certain requirements? Part I identifies objectives and controls. Part II is used for certification.
- ISO 73 Risk Management – Vocabulary
- ISO 27002 Information Technology Security Techniques
- ISO 31000 Risk Management Principles and Guidelines
- IEC 31010 Risk Management – Risk Assessment Techniques
SO 27002 Information Technology Security Techniques
Which of the following ISO documents provides generic guidance on risk management?
- ISO 73 Risk Management – Vocabulary
- ISO 27002 Information Technology Security Techniques
- ISO 31000 Risk Management Principles and Guidelines
- IEC 31010 Risk Management – Risk Assessment Techniques
ISO 31000 Risk Management Principles and Guidelines
ITIL is a group of five books developed by the United Kingdom’s Office of Government Commerce.
TRUE OR FALSE
TRUE
In the CMMI, which level indicates the highest level of maturity?
- 0-6 Level
- 1-4 Level
- 0-4 Level
- 0-5 Level
0-5 Level
The DIACAP is a risk management process applied to IT systems. What happens after a system is accredited?
- It is certified
- It is decommissioned
- It is validated. It receives authority to operate
It is validated. It receives authority to operate
A policy that informs employees what is considered acceptable use for IT systems and data. Banners and logon screens are sometimes used to remind personnel of the policy.
AUP-Acceptable use policy