Details of this Paper

Info Syst Sec Planning & Audit Quiz timed 1 hour and 15 minute to complete: only respond if you good feedback




1. (TCO 3) Information systems are a combination of (Points: 4) applications.;hardware and software.;controls and procedures.;policies and procedures.;Question 2. 2. (TCO 4) Which section of the ISO 17799 deals with personnel security? (Points: 4) 3;4;5;6;Question 3. 3. (TCO 5) Special shielding for computers in areas that are inherently hazardous to electronic equipment includes (Points: 4) plenum cabling.;keyboard membranes.;heavy doors.;clean desk and clear screen policy.;Question 4. 4. (TCO 3) Information labels should be (Points: 4) encrypted.;hidden.;universally understandable.;symbol-based only.;Question 5. 5. (TCO 4) Which of the following are types of background checks? (Points: 4) Credit history;Criminal history;License verification;All of the above;Question 6. 6. (TCO 5) Who should perform the risk assessment to determine the type and strength of the physical security perimeter? (Points: 4) Internal auditor;Information security officer;Facility manager and the office of information security;The Organization for International Standardization (ISO);Question 7. 7. (TCO 3) Who is directly responsible for implementing information asset protection controls? (Points: 4) The CEO or president or chairman of the board;The ISO;The information owner;The information custodian;Question 8. 8. (TCO 4) Which of the following is NOT a type of employee agreement? (Points: 4) Acceptable use agreement;Employee information security affirmation agreement;Certification maintenance agreement;Confidentiality agreement;Question 9. 9. (TCO 5) What is the purpose of a working in secure areas policy? (Points: 4) Protect information assets to prevent unauthorized access or damage to secure areas;Protect the organization?s assets from harm or unauthorized access by placing controls on the environment where the equipment is situated;Build a barrier to prevent unauthorized access, damage, or interference to the business facilities;Protect information assets to prevent unauthorized access or damage to secure offices, rooms and facilities;Question 10. 10. (TCO 3) Who is directly responsible for using information assets in accordance with their classification levels? (Points: 4) The users;The ISO;The information owner;The information custodian;Question 11. 11. (TCO 4) Match the following terms with their relationship to personnel security.;(Points: 4);Potential Matches;1: Establishes definitions for handling information;2: Reaches a wide audience of potential intruders;3: Scrutiny before hiring;4: May unintentionally provide too much information;Answer;Job description;Interview;Background check;Employee agreement;Question 12. 12. (TCO 5) Which of the following might the working in secure areas policy restrict from being brought into a facility? (Points: 4) Cameras;Recording devices;Laptop computers;All of the above;Question 13. 13. (TCO 3) Which of the following is NOT an example of a software asset? (Points: 4) Programs;Code;A wireless access point;An operating system;Question 14. 14. (TCO 5) Which of the following is the primary objective of the clear desk and clear screen policy? (Points: 4) Prevent theft of information from documents and media in plain view;Prevent unauthorized removal of company property;Dictate the level of supervision for secure areas;Prevent unauthorized access and/or damage to business facilities;Question 15. 15. (TCO 3) Criticality ratings are used to (Points: 4) determine the importance of an information asset.;test the strength of the safeguard.;determine the replacement cost.;None of the above


Paper#69216 | Written in 18-Jul-2015

Price : $22