Chat with us, powered by LiveChat Saint COm510 midterm exam | Writedemy

Saint COm510 midterm exam

Saint COm510 midterm exam

Question

Question 1. 1. The process that develops, creates, and implements strategies for the accomplishment of objectives is called ____. (Points : 5)

 
 
 
 

Question 2. 2. ____ implements and oversees the use of controls to reduce risk. (Points : 5)

 
 
 
 

Question 3. 3. Which of the following is an advantage of the user support group form of training? (Points : 5)

 
 
 
 

Question 4. 4. Which of the following is the first step in the process of implementing training? (Points : 5)

 
 
 
 

Question 5. 5. ____ occurs when a control provides proof that a user possesses the identity that he or she claims. (Points : 5)

 
 
 
 

Question 6. 6. According to the C.I.A. triangle, the three desirable characteristics of information are confidentiality, integrity, and ____. (Points : 5)

 
 
 
 

Question 7. 7. Which of the following is a definite indicator of an actual incident? (Points : 5)

 
 
 
 

Question 8. 8. Which of the following certifications is considered among the most prestigious for security managers? (Points : 5)

 
 
 
 

Question 9. 9. The COSO framework component ____, based on the establishment of objectives, assists in the identification and examination of valid risks to objectives as well as information. (Points : 5)

 
 
 
 

Question 10. 10. A medium-sized organization has ____. (Points : 5)

 
 
 
 

Question 11. 11. The ____ component of an EISP defines the organizational structure designed to support information security within the organization. (Points : 5)

 
 
 
 

Question 12. 12. The IRP is usually activated ____. (Points : 5)

 
 
 
 

Question 13. 13. ____ is the process of measuring against established standards. (Points : 5)

 
 
 
 

Question 14. 14. ____ is the quality or state of being whole, complete, and uncorrupted. (Points : 5)

 
 
 
 

Question 15. 15. Very large organizations have ____ computers. (Points : 5)

 
 
 
 

Question 16. 16. A(n) ____ is a detailed description of the activities that occur during an attack. (Points : 5)

 
 
 
 

Question 17. 17. Identification is typically performed by means of a(n) ____. (Points : 5)

 
 
 
 

Question 18. 18. The COSO framework component ____ includes the policies and procedures to support management directives. (Points : 5)

 
 
 
 

Question 19. 19. Defining the scope of an ISMS is part of which phase of the BS7799 Part 2 Plan-Do-Check-Act cycle? (Points : 5)

 
 
 
 

Question 20. 20. A(n) ____ security policy provides detailed, targeted guidance to instruct all members of the organization in the use of technology-based systems. (Points : 5)

 
 
 
 

Question 21. 21. Internal ISMS audits are conducted during the ____ phase of the Plan-Do-Check-Act cycle. (Points : 5)

 
 
 
 

Question 22. 22. ____ control tools evaluate the efficiency and effectiveness of business processes. (Points : 5)

 
 
 
 

Question 23. 23. Which of the following is a disadvantage of user support groups? (Points : 5)

 
 
 
 

Question 24. 24. Corrective or preventive action is taken during the ____ phase of the Plan-Do-Check-Act cycle. (Points : 5)

 
 
 
 

Question 25. 25. To ensure ____, an organization must demonstrate that it is continuously attempting to meet the requirements of the market in which it operates. (Points : 5)

 
 
 
 

Question 26. 26. When users call an organization with problems with their computers, the network, or an Internet connection, they speak with the ____. (Points : 5)

 
 
 
 

Question 27. 27. Communications security involves the protection of an organization’s ____. (Points : 5)

 
 
 
 

Question 28. 28. ____ evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness. (Points : 5)

 
 
 
 

Question 29. 29. A risk assessment is performed during the ____ phase of the SecSDLC. (Points : 5)

 
 
 
 

Question 30. 30. An identified weakness of a controlled system is known as a ____. (Points : 5)

 
 
 
 

Question 31. 31. Which of the following is NOT a question you should ask when considering best practices for your organization? (Points : 5)

 
 
 
 

Question 32. 32. Best business practices are also known as ____. (Points : 5)

 
 
 
 

Question 33. 33. The ____ layer of the bull’s-eye model consists of computers used as servers, desktop computers, and systems used for process control and manufacturing systems. (Points : 5)

 
 
 
 

Question 34. 34. A ____ is a value or profile of a performance metric against which changes in the performance metric can be usefully compared. (Points : 5)

 
 
 
 

Question 35. 35. Which of the following is true about a hot site? (Points : 5)

 
 
 
 

Question 36. 36. The DRP is usually managed by the ____. (Points : 5)

 
 
 
 

Question 37. 37. Operational plans are used by ____. (Points : 5)

 
 
 
 

Question 38. 38. A SDLC-based project that is the result of a carefully developed strategy is said to be ____. (Points : 5)

 
 
 
 

Question 39. 39. A disadvantage of creating a number of independent ISSP documents is that the result may ____. (Points : 5)

 
 
 
 

Question 40. 40. A joint application development team can survive employee turnover by ____. (Points : 5)

 
 
 
 

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order