Risk Management in Information Systems Midterm Exam - 1148 Verified Questions

Page 1


Risk Management in Information Systems

Midterm Exam

Course Introduction

Risk Management in Information Systems explores the principles and practices essential for protecting information assets in todays digital landscape. The course examines the identification, assessment, and mitigation of risks associated with information systems, including threats to data confidentiality, integrity, and availability. Students will learn about risk management frameworks, threat modeling, vulnerability assessment, regulatory compliance, and the development of security policies. Through case studies and practical exercises, participants gain hands-on experience in evaluating organizational risks and implementing effective controls to safeguard information in both traditional and cloud-based environments.

Recommended Textbook

Principles of Information Security 6th Edition by Michael

Available Study Resources on Quizplus

12 Chapters

1148 Verified Questions

1148 Flashcards

Source URL: https://quizplus.com/study-set/2123

Page 2

Chapter 1: Introduction to Information Security

Available Study Resources on Quizplus for this Chatper

87 Verified Questions

87 Flashcards

Source URL: https://quizplus.com/quiz/42300

Sample Questions

Q1) The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

A)True

B)False

Answer: False

Q2) A(n) ____________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.

Answer: community of interest

Q3) A(n)<u> project </u>team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas.

A)True

B)False

Answer: True

Q4) A potential weakness in an asset or its defensive control system(s) is known as a(n)

Answer: vulnerability

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: The Need for Security

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/42301

Sample Questions

Q1) <u>Computer</u> assets are the focus of information security and are the information that has value to theorganization, as well as the systems that store, process, and transmit the information. ____________

A)True

B)False

Answer: False

Q2) Forces of nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.

A)True

B)False

Answer: True

Q3) ____  is any technology that aids in gathering information about a person or organization without their knowledge.

A) A bot

B) Spyware

C) A Trojan

D) A worm

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Legal, Ethical, and Professional Issues in Information Security

Available Study Resources on Quizplus for this Chatper

83 Verified Questions

83 Flashcards

Source URL: https://quizplus.com/quiz/42302

Sample Questions

Q1) Laws, policies, and their associated penalties only provide deterrence if offenders fear the penalty, expect to be caught, and expect the penalty to be applied if they are caught.

A)True

B)False

Answer: True

Q2) Studies on ethics and computer use reveal that people of different nationalities have different perspectives; difficulties arise when one nationality's ethical behavior violates the ethics of another national group.

A)True

B)False Answer: True

Q3) The Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release information about <u>national security</u>without permission. _________________________

A)True

B)False Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Planning for Security

Available Study Resources on Quizplus for this Chatper

109 Verified Questions

109 Flashcards

Source URL: https://quizplus.com/quiz/42303

Sample Questions

Q1) A(n) <u>capability</u> table specifies which subjects and objects users or groups can access. _________________________

A)True

B)False

Q2) The transfer of large batches of data to an off-site facility, usually through leased lines or services, is called ____.

A) off-site storage

B) remote journaling

C) electronic vaulting

D) database shadowing

Q3) ____________________ management is an organization's set of planning and preparation efforts for dealing with potential human injury, emotional trauma, or loss of life as a result of a disaster.

Q4) You can create a single, comprehensive ISSP document covering all information security issues.

A)True

B)False

Q5) What three purposes does the ISSP serve

Q6) What is the purpose of security education, training, and awareness (SETA)

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Risk Management

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/42304

Sample Questions

Q1) Once the inventory and value assessment are complete, you can prioritize each asset using a straightforward process known as ____________________ analysis.

Q2) In information security, <u>benchmarking</u> is the comparison of past security activities and events against the organization's current performance.

A)True

B)False

Q3) Risk _________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.

A) management

B) control

C) identification

D) security

Q4) Organizations should communicate with system users throughout the development of the security program, letting them know that changes are coming, and reduce resistance to these expected changes through communication, education, and involvement.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Security Technology: Access Controls, Firewalls, and VPNS

Available Study Resources on Quizplus for this Chatper

106 Verified Questions

106 Flashcards

Source URL: https://quizplus.com/quiz/42305

Sample Questions

Q1) Firewalls operate by examining a data packet and performing a<u> comparison</u> with some predetermined logical rules. _________________________

A)True

B)False

Q2) The primary disadvantage of stateful packet inspection firewalls is the additional processing required to manage and verify packets against the state table.

A)True

B)False

Q3) In order to keep the Web server inside the internal network, direct all HTTP requests to the <u>internal filtering firewall</u> and configure the internal filtering router/firewall to allow only that device to access the internal Web server.

A)True

B)False

Q4) ____________________ is a firewall type that keeps track of each network connection between internal and external systems using a table and that expedites the processing of those communications.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Q5) The architecture of a(n) ____________________ firewall provides a DMZ.

Chapter 7: Security Technology: Intrusion Detection and

Prevention Systems, and Other Security Tools

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/42306

Sample Questions

Q1) __________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

A) NIDPSs

B) HIDPSs

C) AppIDPSs

D) SIDPSs

Q2) A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

Q3) In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.

A)True

B)False

Q4) A fully distributed IDPS control strategy is an IDPS implementation approach in which all controlfunctions are applied at the physical location of each IDPS component.

A)True

B)False

Q5) A signature-based IDPS is sometimes called a(n) ____________________-based IDPS.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Cryptography

Available Study Resources on Quizplus for this Chatper

109 Verified Questions

109 Flashcards

Source URL: https://quizplus.com/quiz/42307

Sample Questions

Q1) The science of encryption is known as ____________________.

Q2) The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.

A)True B)False

Q3) In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.

A)True

B)False

Q4) The most popular modern version of <u>steganography </u>involves hiding information within files that contain digital pictures or other images.

A)True B)False

Q5) Hashing functions do not require the use of keys, but it is possible to attach a ____________________ code to allow only specified recipients to access the message digest.

Q6) The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is called ___________.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Physical Security

Available Study Resources on Quizplus for this Chatper

77 Verified Questions

77 Flashcards

Source URL: https://quizplus.com/quiz/42308

Sample Questions

Q1) A(n) _________________________ security plan requires that every building have clearly marked fire exits and maps posted throughout the facility.

Q2) A badge is an identification card that is typically carried concealed.

A)True

B)False

Q3) Water damage is considered less dangerous to computer systems than hazardous chemicals like Halon.

A)True

B)False

Q4) Vibration sensors fall into the motion sensor category.

A)True

B)False

Q5) A secure _________________________ is a physical location that has controls in place to minimize the risk of attacks from physical threats.

Q6) The U.S. government has developed a program named _________________________ to reduce the risk of EMR monitoring.

Q7) _________________________ detect movement within a confined space and are either active or passive.

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Implementing Information Security

Available Study Resources on Quizplus for this Chatper

78 Verified Questions

78 Flashcards

Source URL: https://quizplus.com/quiz/42309

Sample Questions

Q1) What can the organization do by managing the process of change

Q2) The __________ layer of the bull's-eye model receives attention last.

A) Policies

B) Networks

C) Systems

D) Applications

Q3) The tasks or action steps that come before the specific task at hand are called ____________________.

Q4) Technology _____________________ is a complex process that organizations use to manage the impact and costs of technology implementation, innovation, and obsolescence.

Q5) The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________.

Q6) The level of resistance to ____________________ impacts the ease with which an organization is able to implement procedural and managerial changes.

Q7) A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.

Q8) What are the major steps in executing the project plan

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Security and Personnel

Available Study Resources on Quizplus for this Chatper

77 Verified Questions

77 Flashcards

Source URL: https://quizplus.com/quiz/42310

Sample Questions

Q1) In many organizations, information security teams lack established roles and responsibilities.

A)True

B)False

Q2) __________ is a cornerstone in the protection of information assets and in the prevention of financial loss.

A) Fire suppression

B) Business separation

C) Separation of duties

D) Collusion

Q3) ISACA offers the CGEIT as well as the CISA and ____________________ certifications.

Q4) The breadth and depth covered in each of the domains makes the __________ one of the most difficult-to-attain certifications on the market.

A) NSA

B) CISO

C) CISSP

D) ISEP

Q5) What tasks must be performed when an employee prepares to leave an organization

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Information Security Maintenance

Available Study Resources on Quizplus for this Chatper

116 Verified Questions

116 Flashcards

Source URL: https://quizplus.com/quiz/42311

Sample Questions

Q1) Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.

A)True

B)False

Q2) __________ are a component of the security triple.

A) Threats

B) Assets

C) Vulnerabilities

D) All of the above

Q3) The primary goal of the ____________________ monitoring domain is an informed awareness of the state of all the organization's networks, information systems, and information security defenses.

Q4) Intelligence for external monitoring can come from a number of sources: vendors, CERT organizations, public network sources, and membership sites.

A)True

B)False

Q5) The ____________________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization's public network.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.