Computer Science > EXAM > mid term exam cis426 ALL ANSWERS 100% CORRECT ANSWERS AID GRADE ‘A’ (All)
addresses how specific a policy is with respect to resources. Selected Answer: Correct Granularity Correct Answer: Correct Granularity Question 2 0 out of 2 points Which of the following statement... s best captures the role of information security teams in ensuring compliance with laws and regulations? Selected Answer: Incorrect Information security personnel must be trained lawyers, and as such they must work with their organizations’ compliance and legal teams to gain an understanding of legal requirements. Correct Answer: Correct Information security personnel work with their organizations’ compliance and legal teams to determine violations of an organization’s security policy. Question 3 2 out of 2 points In the ISO/IEC 27002 framework, describes the use and controls related to encryption. Selected Answer: Correct cryptography Correct Answer: Correct cryptography Question 4 2 out of 2 points Some organizations create a specific consequence model for information security policy. Violations can replace and absorb the broader HR polices that deal with disciplining individuals. A consequence model is intended to be punitive for the individual. Selected Answer: Correct False Correct Answer: Correct False Question 5 2 out of 2 points Which of the following policy frameworks is a widely accepted set of documents that is commonly used as the basis for an information security program, and is an initiative from ISACA, formerly known as the Information Systems Audit and Control Association? Selected Answer: Correct Control Objectives for Information and related Technology (COBIT) Correct Answer: Correct Control Objectives for Information and related Technology (COBIT) Question 6 2 out of 2 points Of the roles commonly found in the development, maintenance, and compliance efforts related to a policy and standards library, which of the following has the responsibilities of directing policies and procedures designed to protect information resources, identifying vulnerabilities, and developing a security awareness program? Selected Answer: Correct information resources security officer Correct Answer: Correct information resources security officer Question 7 0 out of 2 points Implementing security policy means continuous communication with and ensuring transparency about what’s working and what’s not working. Selected Answer: Incorrect executives Correct Answer: Correct stakeholders Question 8 2 out of 2 points Research shows that projects dedicated to information security policies fail due to eight common perceived missteps. Which of the following is not one of the missteps? Selected Answer: Correct Lack of complexity: This refers to an oversimplication of policies that sacrifices depth and nuance. Correct Answer: Correct Lack of complexity: This refers to an oversimplication of policies that sacrifices depth and nuance. Question 9 2 out of 2 points In a large organization, the complexity required to keep operations running effectively requires a hierarchy of specialties. Thus, which of following organizational structures is preferred? Selected Answer: Correct hierarchical organizational structure Correct Answer: Correct hierarchical organizational structure Question 10 2 out of 2 points In order to gain a deeper understanding of how employees interact in the workplace, it is useful to learn about the eight classic personality types that have been identified by HR Magazine. One of these is the achievers. Which of the following descriptions best captures this personality type? Selected Answer: Correct These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being. Correct Answer: Correct These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being. Question 11 2 out of 2 points For leaders, implementing security policies is all about working through others to gain their support and adhere to the policies. Of the widely accepted leadership rules that apply to security policies, which of the following is not among these rules? Selected Answer: Correct productivity Correct Answer: Correct productivity Question 12 2 out of 2 points Implementing security policies is easier if you manage it from a change model perspective. The first step of this model is to create urgency. Who is responsible for conveying urgency to business leaders? Selected Answer: Correct chief information security officer Correct Answer: Correct chief information security officer Question 13 0 out of 2 points A(n) is a term used to indicate any unwanted event that takes places outside the normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies. Selected Answer: Incorrect operational risk Correct Answer: Correct security event Question 14 2 out of 2 points Of the six specific business risks, the risk results from negative publicity regarding an organization’s practices. Litigation and a decline in revenue are possible outcomes of this type of risk. Selected Answer: Correct reputational Correct Answer: Correct reputational Question 15 0 out of 2 points Which of the following is not one of the similarities shared by an enterprise risk management (ERM) framework and a governance, risk management, and compliance (GRC) framework? Selected Answer: Incorrect proactively enforce policy Correct Answer: Correct the importance of value delivery Question 16 0 out of 2 points An illustration of would be an organization installing malware software on the network and endpoint, monitoring for suspicious traffic, and responding as needed. Selected Answer: Incorrect risk evaluation Correct Answer: Correct disposal of risk Question 17 2 out of 2 points Also known as the Federal Information Processing Standards (FIPS), the framework is a shared set of security standards required by the Federal Information Security Management Act (FISMA). Selected Answer: Correct NIST Correct Answer: Correct NIST [Show More]
Last updated: 1 year ago
Preview 1 out of 16 pages
Computer Science> EXAM > AZ-104 examcollection premium exam Version 10 (All)
AZ-104 examcollection premium exam Version 10AZ-104 examcollection premium exam Version 10AZ-104 examcollection premium exam Version 10AZ-104 examcollection premium exam Version 10AZ-104 examcollectio...
By Otieno , Uploaded: Jan 26, 2023
$20
Computer Science> EXAM > WGU C867 SQA Essential Questions | Questions with 100% Correct Answers | Verified | Latest Update (All)
What are the characteristics of acceptance testing? - ✔✔ • the process of comparing the program to its initial requirements and the current needs of its end users. • Performed by the program's cust...
By Tamia Cooper , Uploaded: Mar 13, 2023
$7
Computer Science> EXAM > WGU C795 Cybersecurity Management II Tactical - Ucertify Extra Questions | 132 Questions with 100% Correct Answers | Verified | Latest Update | 28 Pages (All)
Question 1 :A security technician reports to you that a file server is experiencing unscheduled initial program loads (IPLs). Which statement BEST explains this problem? - ✔✔The system is rebooting....
By Tamia Cooper , Uploaded: Mar 13, 2023
$16
Computer Science> EXAM > AZ 104 RENEWAL EXAM QUESTION AND ANSWER UPDATED 2022 (All)
AZ 104 RENEWAL EXAM QUESTION AND ANSWER UPDATED 2022 1) You plan to deploy an Azure web app that will have the following settings: • Name: WebApp1 • Publish: Docker container • Operating system:...
By clairegrades , Uploaded: Aug 18, 2022
$11
Computer Science> EXAM > ServiceNow CSA Exam Questions And Answers/ Latest Update (All)
ServiceNow CSA Exam Questions And Answers/ Latest Update
By Axeldee , Uploaded: Jan 29, 2023
$10
Computer Science> EXAM > ServiceNow CSA Exam Questions And Answers Latest Update (All)
ServiceNow CSA Exam Questions And Answers Latest Update
By Axeldee , Uploaded: Jan 29, 2023
$10.5
Computer Science> EXAM > CompTIA Security+ | FedVTE QUESTIONS AND ANSWERS LATEST UPDATE (All)
CompTIA Security+ | FedVTE QUESTIONS AND ANSWERS LATEST UPDATE
By Axeldee , Uploaded: Jan 05, 2023
$10.5
Computer Science> EXAM > AWS New Notes 2022 (All)
AWS New Notes 2022 Amazon EC2 Pricing
By Topmentor , Uploaded: Sep 05, 2022
$10
Computer Science> EXAM > CyberArk Defender Practice Exam 2022 Questions and Answers (All)
Target account platforms can be restricted to accounts that are stored in specific Safes using the Allowed Safes property. - ANSWER True Which one of the following reports is NOT generated by using...
By MARKALLAN , Uploaded: Aug 06, 2022
$10
Computer Science> EXAM > WGU C700 Pre-Assessment | 70 Questions with 100% Correct Answers | Verified | Latest Update | 31 Pages (All)
An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client m...
By Tamia Cooper , Uploaded: Mar 12, 2023
$15
Connected school, study & course
About the document
Uploaded On
Jun 28, 2021
Number of pages
16
Written in
This document has been written for:
Uploaded
Jun 28, 2021
Downloads
0
Views
23
Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students
Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.
Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality
Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·