Filters
Question type

The ISSP is a plan which sets out the requirements that must be met by the information security blueprint or framework.

Correct Answer

verifed

verified

_________ controls address personnel security, physical security, and the protection of production inputs and outputs.


A) ​Informational
B) Operational
C) ​Technical
D) ​Managerial

Correct Answer

verifed

verified

To achieve defense in depth, an organization must establish multiple layers of security controls and safeguards.

Correct Answer

verifed

verified

Each policy should contain procedures and a timetable for periodic review.

Correct Answer

verifed

verified

Some policies may need a(n) ____________________ indicating their expiration date.

Correct Answer

verifed

verified

A(n) ____________________ backup is the storage of all files that have changed or been added since the last full backup.

Correct Answer

verifed

verified

The transfer of live transactions in real time to an off-site facility is called ____________________.

Correct Answer

verifed

verified

What three purposes does the ISSP serve?

Correct Answer

verifed

verified

The issue-specific security policy, or I...

View Answer

Summarize the strategies that can be chosen by an organization when planning for business continuity.

Correct Answer

verifed

verified

​The determining factor when selecting a...

View Answer

A(n) ____________________ directs members of an organization as to how issues should be addressed and how technologies should be used.

Correct Answer

verifed

verified

A(n) ____________________ is a contract between two or more organizations that specifies how each will assist the other in the event of a disaster.

Correct Answer

verifed

verified

The complete details of ISO/IEC 27002 are widely available to everyone.

Correct Answer

verifed

verified

Database shadowing duplicates data in real-time data storage, but does not back up the databases at the remote site.

Correct Answer

verifed

verified

The ____________________ of an organization are the intermediate states obtained to achieve progress toward a goal or goals.

Correct Answer

verifed

verified

Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether the candidate constitutes an actual incident.

Correct Answer

verifed

verified

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________.


A) firewalls
B) proxy servers
C) access controls
D) All of the above

Correct Answer

verifed

verified

A(n) capability table specifies which subjects and objects users or groups can access. _________________________

Correct Answer

verifed

verified

The ________is the high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts.


A) SysSP
B) EISP
C) GSP
D) ISSP

Correct Answer

verifed

verified

Disaster recovery personnel must know their roles without supporting documentation, which is a function of preparation, training, and rehearsal.

Correct Answer

verifed

verified

A(n) disaster is any adverse event that could result in loss of an information asset or assets, but does not currently threaten the viability of the entire organization. _________________________

Correct Answer

verifed

verified

Showing 21 - 40 of 110

Related Exams

Show Answer