Risk Management in Information Security Midterm Exam - 1111 Verified Questions

Page 1


Risk Management in Information Security

Midterm Exam

Course Introduction

This course explores the principles and practices of risk management within the realm of information security. Students will learn to identify, assess, and prioritize risks to organizational information assets in the context of current threat landscapes and regulatory frameworks. Emphasis is placed on developing risk mitigation strategies, understanding legal and ethical considerations, conducting risk assessments, and utilizing frameworks such as ISO 27005 and NIST SP 800-30. Through case studies and practical exercises, students will acquire the skills necessary to design, implement, and maintain effective risk management programs that safeguard data confidentiality, integrity, and availability.

Recommended Textbook

Principles of Information Security 4th Edition by Michael E. Whitman

Source URL: https://quizplus.com/study-set/2244

Chapter 1: Introduction to Information Security

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/44634

Sample Questions

Q1) In information security,salami theft occurs when an employee steals a few pieces of information at a time,knowing that taking more would be noticed - but eventually the employee gets something complete or useable._________________________

A)True

B)False

Answer: True

Q2) ____ security addresses the issues necessary to protect the tangible items,objects,or areas of an organization from unauthorized access and misuse.

A)Physical

B)Personal

C)Object

D)Standard

Answer: A

Q3) Policies are written instructions for accomplishing a specific task._________________________

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: The Need for Security

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/44635

Sample Questions

Q1) A worm can deposit copies of itself onto all Web servers that the infected system can reach,so that users who subsequently visit those sites become infected. A)True

B)False

Answer: True

Q2) A computer virus consists of segments of code that perform ____________________ actions.

Answer: malicious

Q3) The timing attack explores the contents of a Web browser's ____________________.

Answer: cache

Q4) DoS attacks cannot be launched against routers. A)True

B)False

Answer: False

Q5) Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways._________________________ A)True

B)False

Answer: True

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Legal, Ethical, and Professional Issues in Information Security

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/44636

Sample Questions

Q1) The National Information Infrastructure Protection Act of 1996 modified which Act?

A)USA PATRIOT Act

B)USA PATRIOT Improvement and Reauthorization Act

C)Computer Security Act

D)Computer Fraud and Abuse Act

Answer: D

Q2) Laws and policies and their associated penalties only deter if which of the following conditions is present?

A)Fear of penalty

B)Probability of being caught

C)Probability of penalty being administered

D)All of the above

Answer: D

Q3) "Long arm ____________________" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems.

Answer: jurisdiction

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Risk Management

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/44637

Sample Questions

Q1) Major risk is a combined function of (1)a threat less the effect of threat-reducing safeguards,(2)a vulnerability less the effect of vulnerability reducing safeguards,and (3)an asset less the effect of asset value-reducing safeguards._________________________

A)True

B)False

Q2) Risk control is the application of controls to reduce the risks to an organization's data and information systems.

A)True

B)False

Q3) The difference between an organization's measures and those of others is often referred to as a performance ____________________.

Q4) In information security,benchmarking is the comparison of security activities and events against the organization's future performance._________________________

A)True

B)False

Q5) The ____________________ strategy is the risk control strategy that attempts to prevent the exploitation of the vulnerability.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Planning for Security

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/44638

Sample Questions

Q1) The Federal Bureau of Investigation deals with many computer crimes that are categorized as felonies.

A)True

B)False

Q2) Every member of the organization needs a formal degree or certificate in information security.

A)True

B)False

Q3) Compare electronic vaulting and remote journaling.

Q4) The stated purpose of ____ is to "give recommendations for information security management for use by those who are responsible for initiating,implementing,or maintaining security in their organization."

A)NIST SP800-18

B)RFC 2196

C)ISO/IEC 27002

D)BS7799 (Part 2)

Q5) What three purposes does the ISSP serve?

Q6) A(n)____________________ server performs actions on behalf of another system.

Q7) RAID Level 1 is commonly called disk ____________________.

Q8) What is the purpose of security education,training,and awareness (SETA)? Page 7

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 6: Security Technology: Firewalls and Vpns

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/44639

Sample Questions

Q1) In addition to recording intrusion attempts,a(n)router can be configured to use the contact information to notify the firewall administrator of the occurrence of an intrusion attempt._________________________

A)True

B)False

Q2) Firewalls can be categorized by processing mode,development era,or structure.

A)True

B)False

Q3) ____________________ (terminal emulation)access to all internal servers from the public networks should be blocked.

Q4) List and describe the three interacting services of the Kerberos system.

Q5) A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.

A)dynamic

B)static

C)stateful

D)stateless

Q6) The application firewall is also known as a(n)____________________ server.

Q7) The architecture of a(n)____________________ firewall provides a DMZ.

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Security Technology: Intrusion Detection and

Prevention Systems, and Other Security Tools

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/44640

Sample Questions

Q1) A fully distributed IDPS control strategy is the opposite of the centralized strategy. A)True

B)False

Q2) The ____________________ port is also known as a switched port analysis port or mirror port.

Q3) In DNS cache poisoning,valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on the network.

A)True

B)False

Q4) Using ____,the system reviews the log files generated by servers,network devices,and even other IDPSs.

A)LFM

B)stat IDPS

C)AppIDPS

D)HIDPS

Q5) A packet ____________________ is a network tool that collects copies of packets from the network and analyzes them.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Cryptography

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/44641

Sample Questions

Q1) To use a(n)____________________ cipher,you substitute one value for another.

Q2) Once the attacker has successfully broken an encryption,he or she may launch a replay attack,which is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source.

A)True

B)False

Q3) A(n)____________________ authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions,such as verifying registration information about new registrants,generating end-user keys,revoking certificates,and validating that users possess a valid certificate.

Q4) Standard-HTTP (S-HTTP)is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server.

A)True

B)False

Q5) Hashing functions do not require the use of keys,but it is possible to attach a message ____________________ code.

Q6) A(n)____________________ substitution uses one alphabet.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Physical Security

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/44642

Sample Questions

Q1) The most sophisticated locks are ____ locks.

A)manual

B)programmable

C)electronic

D)biometric

Q2) SPS systems provide power conditioning.

A)True

B)False

Q3) Building codes require that each floor have a number of ____________________,or walls that limit the spread of damage should a fire break out in an office.

Q4) UPS devices typically run up to ____ VA.

A)100

B)250

C)500

D)1,000

Q5) A specialized type of keycard reader is the ____________________ reader,which allows individuals simply to place their cards within the reader's range.

Q6) Explain how a mantrap works.

Page 12

Q7) The thermal detection systems contain a sophisticated heat

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Implementing Information Security

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/44643

Sample Questions

Q1) Once a project is underway,it is managed to completion using a process known as a negative ____________________ loop.

Q2) In the ____ process,measured results are compared to expected results.

A)negative feedback loop

B)wrap-up

C)direct changeover

D)turnover

Q3) In a ____ implementation,the entire security system is put in place in a single office,department,or division,and issues that arise are dealt with before expanding to the rest of the organization.

A)loop

B)direct

C)parallel

D)pilot

Q4) The size of the organization and the normal conduct of business may preclude a single large training program on new security procedures or technologies.

A)True

B)False

Q5) What major project tasks does the WBS document?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Security and Personnel

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/44644

Sample Questions

Q1) ISSEP stands for Information Systems Security Expert Professional._________________________

A)True B)False

Q2) The CISA certification is for information security management professionals._________________________

A)True B)False

Q3) ____ is a cornerstone in the protection of information assets and in the prevention of financial loss.

A)Fire protection

B)Business separation

C)Separation of duties

D)Collusion

Q4) SCP stands for Security Certified Program._________________________ A)True B)False

Q5) All of the existing certifications are fully understood by hiring organizations. A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Information Security Maintenance

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/44645

Sample Questions

Q1) The ____ list is intended to facilitate the development of a free network exploration tool.

A)Nmap-hackers

B)Packet Storm

C)Security Focus

D)Snort-sigs

Q2) A(n)____ item is a hardware or software item that is to be modified and revised throughout its life cycle.

A)revision

B)update

C)change

D)configuration

Q3) A ____ is the recorded state of a particular revision of a software or hardware configuration item.

A)state

B)version

C)configuration

D)baseline

Q4) Virtually all aspects of a company's environment are ____________________.

Q5) Rehearsals that closely match reality are called ____________________ games.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.