The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 2 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Question 1
| policies |
| financial statements |
| standards |
| goals |
4 points  Â
Â
Question 2
| standard |
| policy |
| guidelines |
| procedures |
4 points  Â
Â
Question 3
| should be as broad as possible in scope |
| should be narrowly scoped |
| does not need to address conflicts of interest when selecting team members |
| needs only the approval of information security managers and subject matter experts |
4 points  Â
Â
Question 4
| incident response management |
| security response management |
| breach response management |
| risk management |
4 points  Â
Â
Question 5
| monitoring plan |
| operation plan |
| business strategy |
| tactical plan |
4 points  Â
Â
Question 6
An organization's senior IT official is generally referred to as its:
| A. |
Chief Information Officer |
| B. |
Chief Technology Officer |
| C. |
Chief Information Security Officer |
| D. |
Information Security Manager |
| E. |
Chief financial Officer |
4 points  Â
Â
Question 7
| risk assessment, risk response, training employees, and continuous monitoring |
| risk assessment, ISO compliance, tactical planning, and continuous monitoring |
| risk assessment, risk response, ISO compliance, FISMA compliance |
| risk assessment, risk response, tactical planning, FISMA compliance |
4 points  Â
Â
Question 8
Parties who are responsible in an organization for functional management of the Organization's information security program. This person manages the operational activities and implement controls specified by higher level management.
| A. |
Board of Directors |
| B. |
Chief Information Officer |
| C. |
Chief Technology Officer |
| D. |
Chief Information Security Officer |
| E. |
Information Security Manager |
4 points  Â
Â
Question 9
| tactical planning |
| risk management |
| an incident response plan |
| IT management |
4 points  Â
Â
Question 10
| policy |
| standard |
| guideline |
| procedure |
4 points  Â
Â
Question 11
Most flexible type of Information Security Governance Document.
| A. |
Guidelines |
| B. |
Procedures |
| C. |
Standards |
| D. |
Policies |
| E. |
None of the above |
4 points  Â
Â
Question 12
| information security managers only |
| information security managers and financial planners |
| representatives from business, IT, human resources, executive management, and information security managers |
| information security managers, financial planners, and representatives from business lines |
4 points  Â
Â
Question 13
Group responsible for information security governance.
| A. |
Information Security Management |
| B. |
Executive Management |
| C. |
Chief Information Security Officer |
| D. |
Chief Information Officer |
| E. |
None of the above |
4 points  Â
Â
Question 14
| hot |
| cold |
| warm |
| nearby |
4 points  Â
Â
Question 15
Executive Management's high-level statement of information security directions and goals.
| A. |
Guidelines |
| B. |
Procedures |
| C. |
Standards |
| D. |
Policies |
| E. |
All of the above |
4 points  Â
Â
Question 16
| identification of data ready for destruction |
| proper destruction methods for different kinds of data or storage media |
| consequences for improper destruction |
| how long the data should be retained |
4 points  Â
Â
Question 17
| retention |
| privacy |
| detention |
| use |
4 points  Â
Â
Question 18
| full interruption |
| walk-through |
| scenario |
| parallel |
4 points  Â
Â
Question 19
| baseline |
| minimal |
| safeguard |
| procedural |
4 points  Â
Â
Question 20
| ongoing |
| quantitative |
| probability-based |
| qualitative |
4 points  Â
Â
Question 21
| ongoing |
| quantitative |
| probability-based |
| qualitative |
4 points  Â
Â
Question 22
| acceptable use |
| anti-harassment |
| intellectual property |
| authentication |
4 points  Â
Â
Question 23
What is the primary function of an organization's Information security goals?
| A. |
To support the business objectives |
| B. |
To insure information is not shared |
| C. |
To support industry guidelines |
| D. |
To support mid-level decision making |
| E. |
None of the above |
4 points  Â
Â
Question 24
| threat and available controls |
| threat likelihood and impact |
| impact and severity |
| cost and impact |
4 points  Â
Â
Question 25
Types or categories of business planning:
| A. |
Information Planning |
| B. |
Strategic Planning |
| C. |
Strategic Planning and Tactical Planning |
| D. |
Strategic Planning, Tactical Planning and Operational Planning |
| E. |
Information Planning, Strategic Planning and Operational Planning |