Computer Science > EXAM > mid term exam cis426 ALL ANSWERS 100% CORRECT ANSWERS AID GRADE ‘A’ (All)

mid term exam cis426 ALL ANSWERS 100% CORRECT ANSWERS AID GRADE ‘A’

Document Content and Description Below

addresses how specific a policy is with respect to resources. Selected Answer: Correct Granularity Correct Answer: Correct Granularity Question 2 0 out of 2 points Which of the following statement... s best captures the role of information security teams in ensuring compliance with laws and regulations? Selected Answer: Incorrect Information security personnel must be trained lawyers, and as such they must work with their organizations’ compliance and legal teams to gain an understanding of legal requirements. Correct Answer: Correct Information security personnel work with their organizations’ compliance and legal teams to determine violations of an organization’s security policy. Question 3 2 out of 2 points In the ISO/IEC 27002 framework, describes the use and controls related to encryption. Selected Answer: Correct cryptography Correct Answer: Correct cryptography Question 4 2 out of 2 points Some organizations create a specific consequence model for information security policy. Violations can replace and absorb the broader HR polices that deal with disciplining individuals. A consequence model is intended to be punitive for the individual. Selected Answer: Correct False Correct Answer: Correct False Question 5 2 out of 2 points Which of the following policy frameworks is a widely accepted set of documents that is commonly used as the basis for an information security program, and is an initiative from ISACA, formerly known as the Information Systems Audit and Control Association? Selected Answer: Correct Control Objectives for Information and related Technology (COBIT) Correct Answer: Correct Control Objectives for Information and related Technology (COBIT) Question 6 2 out of 2 points Of the roles commonly found in the development, maintenance, and compliance efforts related to a policy and standards library, which of the following has the responsibilities of directing policies and procedures designed to protect information resources, identifying vulnerabilities, and developing a security awareness program? Selected Answer: Correct information resources security officer Correct Answer: Correct information resources security officer Question 7 0 out of 2 points Implementing security policy means continuous communication with and ensuring transparency about what’s working and what’s not working. Selected Answer: Incorrect executives Correct Answer: Correct stakeholders Question 8 2 out of 2 points Research shows that projects dedicated to information security policies fail due to eight common perceived missteps. Which of the following is not one of the missteps? Selected Answer: Correct Lack of complexity: This refers to an oversimplication of policies that sacrifices depth and nuance. Correct Answer: Correct Lack of complexity: This refers to an oversimplication of policies that sacrifices depth and nuance. Question 9 2 out of 2 points In a large organization, the complexity required to keep operations running effectively requires a hierarchy of specialties. Thus, which of following organizational structures is preferred? Selected Answer: Correct hierarchical organizational structure Correct Answer: Correct hierarchical organizational structure Question 10 2 out of 2 points In order to gain a deeper understanding of how employees interact in the workplace, it is useful to learn about the eight classic personality types that have been identified by HR Magazine. One of these is the achievers. Which of the following descriptions best captures this personality type? Selected Answer: Correct These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being. Correct Answer: Correct These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being. Question 11 2 out of 2 points For leaders, implementing security policies is all about working through others to gain their support and adhere to the policies. Of the widely accepted leadership rules that apply to security policies, which of the following is not among these rules? Selected Answer: Correct productivity Correct Answer: Correct productivity Question 12 2 out of 2 points Implementing security policies is easier if you manage it from a change model perspective. The first step of this model is to create urgency. Who is responsible for conveying urgency to business leaders? Selected Answer: Correct chief information security officer Correct Answer: Correct chief information security officer Question 13 0 out of 2 points A(n) is a term used to indicate any unwanted event that takes places outside the normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies. Selected Answer: Incorrect operational risk Correct Answer: Correct security event Question 14 2 out of 2 points Of the six specific business risks, the risk results from negative publicity regarding an organization’s practices. Litigation and a decline in revenue are possible outcomes of this type of risk. Selected Answer: Correct reputational Correct Answer: Correct reputational Question 15 0 out of 2 points Which of the following is not one of the similarities shared by an enterprise risk management (ERM) framework and a governance, risk management, and compliance (GRC) framework? Selected Answer: Incorrect proactively enforce policy Correct Answer: Correct the importance of value delivery Question 16 0 out of 2 points An illustration of would be an organization installing malware software on the network and endpoint, monitoring for suspicious traffic, and responding as needed. Selected Answer: Incorrect risk evaluation Correct Answer: Correct disposal of risk Question 17 2 out of 2 points Also known as the Federal Information Processing Standards (FIPS), the framework is a shared set of security standards required by the Federal Information Security Management Act (FISMA). Selected Answer: Correct NIST Correct Answer: Correct NIST [Show More]

Last updated: 1 year ago

Preview 1 out of 16 pages

Reviews( 0 )

Recommended For You

 Computer Science> EXAM > AZ-104 examcollection premium exam Version 10 (All)

preview
AZ-104 examcollection premium exam Version 10

AZ-104 examcollection premium exam Version 10AZ-104 examcollection premium exam Version 10AZ-104 examcollection premium exam Version 10AZ-104 examcollection premium exam Version 10AZ-104 examcollectio...

By Otieno , Uploaded: Jan 26, 2023

$20

 Computer Science> EXAM > WGU C867 SQA Essential Questions | Questions with 100% Correct Answers | Verified | Latest Update (All)

preview
WGU C867 SQA Essential Questions | Questions with 100% Correct Answers | Verified | Latest Update

What are the characteristics of acceptance testing? - ✔✔ • the process of comparing the program to its initial requirements and the current needs of its end users. • Performed by the program's cust...

By Tamia Cooper , Uploaded: Mar 13, 2023

$7

 Computer Science> EXAM > WGU C795 Cybersecurity Management II Tactical - Ucertify Extra Questions | 132 Questions with 100% Correct Answers | Verified | Latest Update | 28 Pages (All)

preview
WGU C795 Cybersecurity Management II Tactical - Ucertify Extra Questions | 132 Questions with 100% Correct Answers | Verified | Latest Update | 28 Pages

Question 1 :A security technician reports to you that a file server is experiencing unscheduled initial program loads (IPLs). Which statement BEST explains this problem? - ✔✔The system is rebooting....

By Tamia Cooper , Uploaded: Mar 13, 2023

$16

 Computer Science> EXAM > AZ 104 RENEWAL EXAM QUESTION AND ANSWER UPDATED 2022 (All)

preview
AZ 104 RENEWAL EXAM QUESTION AND ANSWER UPDATED 2022

AZ 104 RENEWAL EXAM QUESTION AND ANSWER UPDATED 2022 1) You plan to deploy an Azure web app that will have the following settings: • Name: WebApp1 • Publish: Docker container • Operating system:...

By clairegrades , Uploaded: Aug 18, 2022

$11

 Computer Science> EXAM > ServiceNow CSA Exam Questions And Answers/ Latest Update (All)

preview
ServiceNow CSA Exam Questions And Answers/ Latest Update

ServiceNow CSA Exam Questions And Answers/ Latest Update

By Axeldee , Uploaded: Jan 29, 2023

$10

 Computer Science> EXAM > ServiceNow CSA Exam Questions And Answers Latest Update (All)

preview
ServiceNow CSA Exam Questions And Answers Latest Update

ServiceNow CSA Exam Questions And Answers Latest Update

By Axeldee , Uploaded: Jan 29, 2023

$10.5

 Computer Science> EXAM > CompTIA Security+ | FedVTE QUESTIONS AND ANSWERS LATEST UPDATE (All)

preview
CompTIA Security+ | FedVTE QUESTIONS AND ANSWERS LATEST UPDATE

CompTIA Security+ | FedVTE QUESTIONS AND ANSWERS LATEST UPDATE

By Axeldee , Uploaded: Jan 05, 2023

$10.5

 Computer Science> EXAM > AWS New Notes 2022 (All)

preview
AWS New Notes 2022

AWS New Notes 2022 Amazon EC2 Pricing

By Topmentor , Uploaded: Sep 05, 2022

$10

 Computer Science> EXAM > CyberArk Defender Practice Exam 2022 Questions and Answers (All)

preview
CyberArk Defender Practice Exam 2022 Questions and Answers

Target account platforms can be restricted to accounts that are stored in specific Safes using the Allowed Safes property. - ANSWER True Which one of the following reports is NOT generated by using...

By MARKALLAN , Uploaded: Aug 06, 2022

$10

 Computer Science> EXAM > WGU C700 Pre-Assessment | 70 Questions with 100% Correct Answers | Verified | Latest Update | 31 Pages (All)

preview
WGU C700 Pre-Assessment | 70 Questions with 100% Correct Answers | Verified | Latest Update | 31 Pages

An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client m...

By Tamia Cooper , Uploaded: Mar 12, 2023

$15

$12.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
23
0

Document information


Connected school, study & course



About the document


Uploaded On

Jun 28, 2021

Number of pages

16

Written in

Seller


seller-icon
Allan100

Member since 2 years

16 Documents Sold


Additional information

This document has been written for:

Uploaded

Jun 28, 2021

Downloads

 0

Views

 23

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.


$12.00

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter
Useful links
  • Courses
  • Categories
  • We accept

    payment cards


    Copyright © Browsegrades · High quality services·