Filters
Question type

Study Flashcards

The ISO/IEC 27000 series is derived from an earlier standard, BS7799.

Correct Answer

verifed

verified

The complete details of ISO/IEC 27002 are widely available to everyone.

Correct Answer

verifed

verified

Some policies may need a(n) ____________________ indicating their expiration date.

Correct Answer

verifed

verified

A managerial guidance SysSP document is created by the IT experts in a company to guide management in the implementation and configuration of technology.

Correct Answer

verifed

verified

__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.


A)  Firewalling
B)  Hosting 
C)  Redundancy
D)  Domaining

Correct Answer

verifed

verified

Every member of the organization's InfoSec department must have a formal degree or certification in information security.

Correct Answer

verifed

verified

Database shadowing duplicates data in real-time data storage, but does not back up the databases at the remote site.

Correct Answer

verifed

verified

Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.

Correct Answer

verifed

verified

Some policies may also need a(n) sunset clause indicating their expiration date. _________________________

Correct Answer

verifed

verified

RAID Level 1 is commonly called disk ____________________.

Correct Answer

verifed

verified

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ________.


A)  plan
B)  standard 
C)  policy
D)  blueprint

Correct Answer

verifed

verified

Law enforcement agencies may be much more capable of processing __________ than an organization that has been victimized.​

Correct Answer

verifed

verified

Systems-specific security policies are organizational policies that provide detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies. _________________________

Correct Answer

verifed

verified

____________________-specific security policies often function as standards or procedures to be used when configuring or maintaining systems.

Correct Answer

verifed

verified

________often function as standards or procedures to be used when configuring or maintaining systems.


A)  ESSPs
B)  EISPs 
C)  ISSPs
D)  SysSPs

Correct Answer

verifed

verified

A ____ site provides only rudimentary services and facilities.


A)  commercial
B)  warm 
C)  hot
D)  cold

Correct Answer

verifed

verified

The recovery point objective (RPO) is the point in time prior to a disruption or system outage to which mission/business process data can be recovered after an outage. _________________________

Correct Answer

verifed

verified

The ____________________ of an organization are the intermediate states obtained to achieve progress toward a goal or goals.

Correct Answer

verifed

verified

Managerial controls set the direction and scope of the security process and provide detailed instructions for its conduct.

Correct Answer

verifed

verified

A(n) alarming event is an event with negative consequences that could threaten the organization's information assets or operations.__________________

Correct Answer

verifed

verified

Showing 21 - 40 of 109

Related Exams

Show Answer