Test Bank For Information Security And IT Risk Management 1st Edition by Manish Agrawal
CHAPTER 5
-
- The majority of information security incidents are identified by
- Organizations other than the affected organization
- Investigators
- The affected organizations
- Law enforcement
- The majority of information security incidents are identified by
Answer: (a)
-
- The ISO standard for information security is
- ISO 9000
- ISO 27002
- ISO 14000
- ISO 3166
- The ISO standard for information security is
Answer: (b)
-
- Checklist-based approaches can be used to identify
- Asset priorities
- Idiosyncratic assets
- General assets
- Assets
- Checklist-based approaches can be used to identify
Answer: (c)
-
- Bottom-up and top-down approaches are needed to identify
- Asset priorities
- General assets
- Assets
- Idiosyncratic assets
- Bottom-up and top-down approaches are needed to identify
Answer: (d)
-
- An example of a top-down approach to asset identification is
- Reading the mission statement of the organization
- Talking to co-workers
- Reading on-boarding documentation
- All of the above
- An example of a top-down approach to asset identification is
Answer: (a)
-
- Information assets are
- Software tools needed to accomplish the organization’s mission
- Digitally stored content owned by an individual or organization
- Employees whose departure could adversely affect the organization
- Machinery involved in supporting the business
- Information assets are
Answer: (b)
-
- Personnel assets are
- Software tools needed to accomplish the organization’s mission
- Digitally stored content owned by an individual or organization
- Employees whose departure could adversely affect the organization
- Machinery involved in supporting the business
- Personnel assets are
Answer: (c)
-
- Hardware assets are
- Software tools needed to accomplish the organization’s mission
- Digitally stored content owned by an individual or organization
- Employees whose departure could adversely affect the organization
- Machinery involved in supporting the business
- Hardware assets are
Answer: (d)
-
- Software assets are
- Software tools needed to accomplish the organization’s mission
- Digitally stored content owned by an individual or organization
- Employees whose departure could adversely affect the organization
- Machinery involved in supporting the business
- Software assets are
Answer: (a)
-
- In most organizations, the most important assets from the perspective of information security are
- Hardware assets
- Information assets
- Software assets
- Personnel assets
- In most organizations, the most important assets from the perspective of information security are
Answer: (b)
Reviews
There are no reviews yet.