Cybersecurity Management Study Guide Questions - 1438 Verified Questions

Page 1


Cybersecurity Management Study Guide Questions

Course Introduction

Cybersecurity Management explores the strategic and operational aspects of protecting information systems and data within organizations. The course covers essential topics such as risk assessment, security policy development, compliance frameworks, incident response planning, and the use of managerial tools to safeguard digital assets. Students will examine contemporary threats and vulnerabilities, analyze case studies of security breaches, and learn best practices for building a comprehensive cybersecurity program. Emphasis is placed on aligning security initiatives with business objectives, fostering a culture of security awareness, and understanding the legal and ethical considerations in cybersecurity management.

Recommended Textbook Management of Information Security 3rd Edition by Michael

Source URL: https://quizplus.com/study-set/2354

Page 2

Chapter 1: Introduction to the Management of Information Security

Available Study Resources on Quizplus for this Chatper

139 Verified Questions

139 Flashcards

Source URL: https://quizplus.com/quiz/46799

Sample Questions

Q1) Both autocratic and democratic leaders tend to be action-oriented. A)True

B)False

Answer: True

Q2) \(\text {\underline{ Operations } }\) are discrete sequences of activities with starting points and defined completion points._________________________ A)True

B)False

Answer: False

Q3) All managers are expected to play a leadership role. A)True

B)False

Answer: False

Q4) The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and ____________________.

Answer: deliverables

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Planning for Security

Available Study Resources on Quizplus for this Chatper

123 Verified Questions

123 Flashcards

Source URL: https://quizplus.com/quiz/46800

Sample Questions

Q1) The first phase of the security systems development life cycle (SecSDLC)is the ____ phase.

A) analysis

B) investigation

C) logical design

D) physical design

Answer: B

Q2) Which of the following is a characteristic of the bottom-up approach to security implementation?

A) Strong upper-management support

B) A clear planning and implementation process

C) Systems administrators attempting to improve the security of their systems

D) Ability to influence organizational culture

Answer: C

Q3) Which of the following is true about mission statements?

A) They should be ambitious

B) They express what the organization is

C) They express the aspirations of the organization

D) They are not meant to be probable

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Planning for Contingencies

Available Study Resources on Quizplus for this Chatper

114 Verified Questions

114 Flashcards

Source URL: https://quizplus.com/quiz/46801

Sample Questions

Q1) A(n)\(\text {\underline{ alert message} }\)

is a scripted set of initial instructions used to respond to an incident._________________________

A)True

B)False

Answer: True

Q2) The ____ plan focuses on the immediate response to an incident.

A) DR

B) IR

C) BC

D) FR

Answer: B

Q3) Computer hardware and peripherals are provided in a cold site.

A)True

B)False

Answer: False

Q4) The bulk batch-transfer of data to an off-site facility is known as ____________________.

Answer: electronic vaulting

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Information Security Policy

Available Study Resources on Quizplus for this Chatper

133 Verified Questions

133 Flashcards

Source URL: https://quizplus.com/quiz/46802

Sample Questions

Q1) Policies must also specify the penalties for unacceptable behavior and define a(n)____.

A) appeals process

B) legal recourse

C) responsible managers

D) requirements for revision

Q2) Capability tables are also known as ____.

A) system policies

B) user policies

C) system profiles

D) account lists

Q3) A quality information security program begins and ends with policy.

A)True

B)False

Q4) Which of the following is a type of information security policy that deals with the entirety of an organization's information security efforts?

A) Issue-specific security policy

B) System-specific security policy

C) Company-wide security policy

D) Enterprise information security policy

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Developing the Security Program

Available Study Resources on Quizplus for this Chatper

133 Verified Questions

133 Flashcards

Source URL: https://quizplus.com/quiz/46803

Sample Questions

Q1) A security technician is usually an entry-level position.

A)True

B)False

Q2) An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.

Q3) A medium-sized organization has ____.

A) a larger security staff than a small organization

B) a larger security budget (as percent of IT budget) than a small organization

C) a smaller security budget (as percent of IT budget) than a large organization

D) larger security needs than a small organization

Q4) According to Briney and Prince,"Security spending per user and per machine declines exponentially as organizations grow."

A)True

B)False

Q5) Very large organizations tend to have the<u> largest</u> budget per user of all organizational sizes discussed._________________________

A)True

B)False

Q6) Explain the conflict between the goals and objectives of the CIO and the CISO.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Security Management Models

Available Study Resources on Quizplus for this Chatper

120 Verified Questions

120 Flashcards

Source URL: https://quizplus.com/quiz/46804

Sample Questions

Q1) The ___ or Chinese Wall model is designed to prevent a conflict of interest between two parties.

A) Bell-LaPadula

B) Graham-Denning

C) Brewer-Nash

D) Harrison-Ruzzo-Ullman

Q2) ____________________ is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.

Q3) ____________________ limits a user's access to the specific information required to perform the currently assigned task,and not merely to the category of data required for a general work function.

Q4) An ATM machine is a common example of a(n)<u>constrained user interface</u> form of access control._________________________

A)True

B)False

Q5) A(n)____________________ is the outline of an information security blueprint.

Q6) ____________________ controls restore operating conditions back to normal.

Q7) The COBIT model categorizes control objectives into four domains.List them.

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Security Management Practices

Available Study Resources on Quizplus for this Chatper

114 Verified Questions

114 Flashcards

Source URL: https://quizplus.com/quiz/46805

Sample Questions

Q1) The benefits of using information security performance measures include all but which of the following?

A) Increasing efficiency for InfoSec performance

B) Improving effectiveness of InfoSec activities

C) Demonstrating compliance with laws, rules and regulations

D) Providing quantifiable inputs for resource allocation decisions

Q2) Once developed,information security performance measures must be implemented and integrated into ____ information security management operations.

A) cost-effective

B) ongoing

C) efficient

D) regulated

Q3) In selecting among recommended practices,an organization should seek to ensure that the target ____ is similar to their own.

A) threat environment

B) resource expenditures

C) organization structure

D) all of these

To view all questions and flashcards with answers, click on the resource link above.

9

Chapter 8: Risk Management: Identifying and Assessing Risk

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/46806

Sample Questions

Q1) According to Sun Tzu - knowing yourself and your enemy "for every victory gained,you will suffer a defeat".

A)True

B)False

Q2) Which of the following activities is part of the risk identification process?

A) Determining the likelihood that vulnerable systems will be attacked by specific threats

B) Calculating the risks to which assets are exposed in their current setting

C) Assigning a value to each information asset

D) Assessing the relative risk facing the organization's information assets

Q3) A ranked vulnerability risk worksheet assigns a ranked value or impact weight to each information asset.

A)True

B)False

Q4) The final step in the risk identification process is to list the assets in order of <u>cost</u>,using a weighted factor analysis worksheet._________________________

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Q5) Classification categories must be ____________________ and mutually exclusive.

Chapter 9: Risk Management: Controlling Risk

Available Study Resources on Quizplus for this Chatper

105 Verified Questions

105 Flashcards

Source URL: https://quizplus.com/quiz/46807

Sample Questions

Q1) ____ is usually determined by valuing the information asset or assets exposed by the vulnerability and then determining how much of that value is at risk,and how much risk exists for the asset.

A) Risk

B) Asset value

C) Cost

D) Benefit

Q2) The Annualized Loss Expectancy in the CBA formula is determined as ____.

A) ALE * ARO

B) SLE * ARO

C) ACS - SLE(post)

D) AV * EF

Q3) Due care and due diligence occur when an organization adopts a certain minimum level of security as what any ____________________ organization would do in similar circumstances.

Q4) Briefly describe the four basic strategies to control risk that result from vulnerabilities.

Q5) The threat level and an asset's ____________________ should be a major factor in the risk control strategy selection.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Protection Mechanisms

Available Study Resources on Quizplus for this Chatper

133 Verified Questions

133 Flashcards

Source URL: https://quizplus.com/quiz/46808

Sample Questions

Q1) Which of the following criteria would NOT satisfy the legal use of a packet sniffer?

A) Having direct authorization of the network's owners

B) Being on a network that the organization leases

C) Having knowledge and consent of the content creators (users)

D) Being on a network that the organization owns

Q2) The first generation of firewalls,packet filtering firewalls,are simple networking devices that filter packets by examining every incoming and outgoing packet

Q3) Briefly describe how biometric technologies are generally evaluated.

Q4) Two keys are used to encrypt and decrypt messages in symmetric encryption.

A)True

B)False

Q5) ____ firewalls are network devices that examine every incoming and outgoing packet's header,selectively allowing or rejecting packets based on the header information.

A) Packet filtering

B) Stateful inspection

C) DMZ

D) Proxy

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Personnel and Security

Available Study Resources on Quizplus for this Chatper

133 Verified Questions

133 Flashcards

Source URL: https://quizplus.com/quiz/46809

Sample Questions

Q1) CISOs are primarily charged with the day-to-day operation of the information security program.

A)True

B)False

Q2) Employees who perform security monitoring functions within an organization fall under the classification of information security positions that ____. A) define

B) build

C) administer

D) audit

Q3) Briefly describe at least five types of background checks.

Q4) It is important to have security clauses and policies as part of employment contracts in place at the time of ____________________ because it is much more difficult to implement such documents with existing employees .

Q5) <u>Contract</u> workers are brought in by organizations to temporarily fill positions or to supplement the existing workforce._________________________

A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Law and Ethics

Available Study Resources on Quizplus for this Chatper

113 Verified Questions

113 Flashcards

Source URL: https://quizplus.com/quiz/46810

Sample Questions

Q1) Socially acceptable behaviors that conform to the widely held principles of the members of that society are referred to as ____________________.

Q2) The utilitarian ethical approach emphasizes that an ethical action is one that results in the most good,or the least harm; the utilitarian approach seeks to link consequences to choices.

A)True

B)False

Q3) Which of the following is a U.S.-based international effort to reduce the impact of copyright,trademark,and privacy infringement?

A) Federal Privacy Act

B) The Electronic Communications Privacy Act

C) Digital Millennium Copyright Act

D) Computer Fraud and Abuse Act

Q4) The Electronic Communications Privacy Act addresses matters related to ____________________ of electronic communications.

Q5) Due ____________________ requires that an organization make sufficient and ongoing efforts to protect others.

Q6) Briefly describe five different types of laws.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook