Details of this Paper





1. (TCO 3) According to your text, what are the four types of corporate policies? (Points: 5) Physical, personnel, technical, and administrative;Programme-level, programme-framework, issue specific, and system specific;Corporate, system, technology, and device;Technical, operational, procedural, and management;Laws, orders, directives, and regulations;Question 2. 2. (TCO 3) Separation of duties is a(n) _____. (Points: 5) control;accountability practice;policy clause;best management practice;All of the above;Question 3. 3. (TCO 3) _____ authorize access to information. (Points: 5) Security administrators;Information owners;Access coordinators;Network engineers;Users;Question 4. 4. (TCO 3) What does SDLC stands for? (Points: 5) Software development license cycle;Software development life cycle;System development life cycle;System definition life cycle;None of the above;Question 5. 5. (TCO 4) Out of the kinds of intellectual property, what is the one category that does not benefit from legal protection? (Points: 5) Copyright;Trademark;Patent;Trade secret;Question 6. 6. (TCO 4) Which of the following "commandments" should be part of the information security professional's code of ethics? (Points: 5) I will abide by the Constitution of the United States.;I will dress appropriately for the company environment.;I will protect the equities of senior management.;I will act honorably, honestly, justly, responsibly, and legally.;Question 7. 7. (TCO 5) A reference monitor should have all of the following except which attribute? (Points: 5) Complete in that it mediates all access between subjects and objects;Changeable by other system entities;Simple enough to be completely verified;Highly tamper resistant;Impossible to bypass;Question 8. 8. (TCO 5) A reference monitor is _____. (Points: 5) a security model;a security control;a network security model;only appropriate in ringed architecture;Question 9. 9. (TCO 4) Denial of service attacks, rogue code, and software piracy are some of the ways that _____ commit crimes. (Points: 5) aggressive programmers;computer enthusiasts;cyber criminals;foreign operatives;Question 10. 10. (TCO 5) What does a product or system have enforced over it by one or more components of the trusted computing base (TCB)? (Points: 5) Tools and methodologies;Unified security policy;Kernel monitoring;Driver signing


Paper#70577 | Written in 18-Jul-2015

Price : $22