Quiz 6 Flashcards
Planning and Implementing Information Security
What is a key process in the ‘Prepare’ phase of security planning?
Assessing the type of CISO needed
Performing a security audit
Conducting a SWOT analysis
Implementing security measures
Assessing the type of CISO needed
Which of the following is a common threat to information security?
Insider data leak
Asset inventory
Stakeholder engagement
Strong data encryption
Insider data leak
What does the ‘SWOT’ in SWOT analysis stand for?
Strengths, Weaknesses, Outcomes, Techniques
Systems, Weaknesses, Opportunities, Technologies
Strategy, Weaknesses, Optimization, Threats
Strengths, Weaknesses, Opportunities, Threats
Strengths, Weaknesses, Opportunities, Threats
What is the primary purpose of the SETA program?
To reduce accidental security breaches
To monitor external threats
To increase network performance
To develop security policies
To reduce accidental security breaches
What is one of the disadvantages of involving law enforcement in a security incident?
They are not equipped to handle evidence
The organization may lose control over the case
They lack expertise in obtaining witness statements
They cannot provide legal warrants
The organization may lose control over the case
Which of the following best describes the relationship between CVE and NVD?
NVD identifies vulnerabilities, and CVE provides severity scores for those vulnerabilities
CVE and NVD are the same, both serving as a database for vulnerability patching
CVE lists vulnerabilities with unique identifiers, and NVD provides enhanced information such as severity scores and impact metrics
CVE provides a detailed analysis of each vulnerability, while NVD assigns vulnerability scores based on the analysis
CVE lists vulnerabilities with unique identifiers, and NVD provides enhanced information such as severity scores and impact metrics
Which of the following is a key control strategy to protect information assets?
Hiring only temporary employees
Separation of duties
Eliminating job rotations
Allowing employees full autonomy in their roles
Separation of duties
What is a critical step to reducing unauthorized access to business systems?
Tokenizing all outgoing communications
Increasing the number of employees in the IT department
Using basic password protection for all accounts
Implementing multi-factor authentication
Implementing multi-factor authentication
Match the term with its correct definition.
Policy
Standard
Guideline
Policy: “A general course of action used by an organization to influence decisions and actions.”
Standard: “A set of detailed statements that specify what must be done to comply with the policy.”
Guideline: “Recommendations on how to comply with policies and standards, providing flexibility in implementation.”
Icelandic police authorities have not found it easy to contact the representatives of “Witheld for Privacy” when issues have arisen.
True
False
True