You are on page 1of 6

Review Questions

1. Which of the following contains the primary goals and objectives of security?

A. A network’s border perimeter B. The CIA Triad

C. A stand-alone system D. The Internet

2. Vulnerabilities and risks are evaluated based on their threats against which of the

following?

A. One or more of the CIA Triad C. Due care


principles
D. Extent of liability
B. Data usefulness

3. Which of the following is a principle of the CIA Triad that means authorized subjects are

granted timely and uninterrupted access to objects?

A. Identification C. Encryption

B. Availability D. Layering

4. Which of the following is not considered a violation of confidentiality?

A. Stealing passwords C. Hardware destruction

B. Eavesdropping D. Social engineering

5. Which of the following is not true?

A. Violations of confidentiality include C. Violations of confidentiality are


human error. limited to direct intentional attacks.

B. Violations of confidentiality include D. Violations of confidentiality can occur


management oversight. when a transmission is not properly
encrypted.

7. If a security mechanism offers availability, then it offers a high level of assurance that

authorized subjects can _________________________ the data, objects, and resources.


A. Control C. Access

B. Audit D. Repudiate

8. ____________ refers to keeping information confidential that is personally identifiable or

which might cause harm, embarrassment, or disgrace to someone if revealed.

A. Seclusion C. Privacy

B. Concealment D. Criticality

9. All but which of the following items requires awareness for all individuals affected?

A. Restricting personal email D. The backup mechanism used to retain


email messages
B. Recording phone conversations

C. Gathering information about surfing


habits

12. Which of the following is the most important and distinctive concept in relation to layered

security?

A. Multiple D. Filter

C. Parallel B. Series

Chapter Two

7. Which of the following statements is not true?

A. IT security can provide protection only C. Risks to an IT infrastructure are all


against logical or technical attacks. computer based.

B. The process by which the goals of risk D. An asset is anything used in a business
management are achieved is known as risk process or task.
analysis.

8. Which of the following is not an element of the risk analysis process?

A. Analyzing an environment for risks C. Selecting appropriate safeguards and


implementing them
B. Creating a cost/benefit report for
safeguards to present to upper management
D. Evaluating each threat event as to its
likelihood of occurring and cost of the
resulting damage

9. Which of the following would generally not be considered an asset in a risk analysis?

A. A development process C. A proprietary system resource

B. An IT infrastructure D. Users’ personal files

10. Which of the following represents accidental or intentional exploitations of vulnerabilities?

A. Threat events C. Threat agents

B. Risks D. Breaches

11. When a safeguard or a countermeasure is not present or is not sufficient, what remains?

A. Vulnerability C. Risk

B. Exposure D. Penetration

12. Which of the following is not a valid definition for risk?

A. An assessment of probability, C. Risk = threat * vulnerability


possibility, or chance
D. Every instance of exposure
B. Anything that removes a vulnerability
or protects against one or more specific
threats

16. What security control is directly focused on preventing collusion?

A. Principle of least privilege C. Separation of duties

B. Job descriptions D. Qualitative risk analysis

17. What process or event is typically hosted by an organization and is targeted to groups of

employees with similar job functions?

A. Education C. Training

B. Awareness D. Termination
18. Which of the following is not specifically or directly related to managing the security
function of an organization?

A. Worker job satisfaction C. Information security strategies

B. Metrics D. Budget

Chapter Three

1. What is the first step that individuals responsible for the development of a business
continuity plan should perform?

A. BCP team selection C. Resource requirements analysis

B. Business organization analysis D. Legal and regulatory assessment

2. Once the BCP team is selected, what should be the first item placed on the team’s agenda?

A. Business impact assessment C. Resource requirements analysis

B. Business organization analysis D. Legal and regulatory assessment

3. What is the term used to describe the responsibility of a firm’s officers and directors to

ensure that adequate measures are in place to minimize the effect of a disaster on the

organization’s continued viability?

A. Corporate responsibility C. Due diligence

B. Disaster requirement D. Going concern responsibility

4. What will be the major resource consumed by the BCP process during the BCP phase?

A. Hardware C. Processing time

B. Software D. Personnel

16. In which business continuity planning task would you actually design procedures and

mechanisms to mitigate risks deemed unacceptable by the BCP team?

A. Strategy development B. Business impact assessment


C. Provisions and processes D. Resource prioritization

18. What type of plan outlines the procedures to follow when a disaster interrupts the normal

operations of a business?

A. Business continuity plan C. Disaster recovery plan

B. Business impact assessment D. Vulnerability assessment

Chapter Four

1. Which criminal law was the first to implement penalties for the creators of viruses, worms,

and other types of malicious code that cause harm to computer system(s)?

A. Computer Security Act C. Computer Fraud and Abuse Act

B. National Infrastructure Protection Act D. Electronic Communications Privacy Act

2. Which law first required operators of federal interest computer systems to undergo periodic

training in computer security issues?

A. Computer Security Act C. Computer Fraud and Abuse Act

B. National Infrastructure Protection Act D. Electronic Communications Privacy Act

3. What type of law does not require an act of Congress to implement at the federal level but

rather is enacted by the executive branch in the form of regulations, policies, and procedures?

A. Criminal law C. Civil law

B. Common law D. Administrative law

4. Which federal government agency has responsibility for ensuring the security of government
computer systems that are not used to process sensitive and/or classified information?

A. National Security Agency

B. Federal Bureau of Investigation

C. National Institute of Standards and


Technology

D. Secret Service

You might also like