Saintleo COM590 Midterm Exam Latest 2019 JUNE

Question

Dot Image

COM590 Strategic Planning Cybersecurity

MIDTERM EXAM

Question 1 Which
set of security tenets best represents the information assurance framework?

Question 1
options:

C-I-A triad

None of the
above

Confidentiality
and integrity

The five
pillars

Question 2 During
which phase of the COBIT ISS management life cycle do you review how you are
going to manage your IT investment such as contracts, service level agreements
(SLAs), and new policy ideas?

Question 2
options:

Deliver and
Support

Monitor and
Evaluate

Acquire and
Implement

Plan and
Organize

Question 3 Which
of the following is considered a how-to document?

Question 3
options:

Guideline

Policy

Standard

Procedure

Question 4 During
which phase of the COBIT ISS management life cycle do internal and external
audits occur?

Question 4
options:

Acquire and
Implement

Monitor and
Evaluate

Deliver and
Support

Plan and
Organize

Question 5
What does COBIT stand for?

Question 5
options:

Common
Objects for Information and Technology

Control
Objectives for Information and Related Technology

Common
Objectives for Information and Technology

Control Objects
for Information Technology

Question 6 A business __________ emerges when an
organization cannot meet its obligation or duty.

Question 6
options:

driver

None of the
above

liability

culture

Question 7 Security
controls fall into three design types: preventive, detective, and:

Question 7
options:

qualitative.

quantitative.

effective.

corrective.

Question 8 An
organization’s security awareness program is an example of which type of
security control?

Question 8
options:

Administrative

Detective

Technical

Physical

Question 9 Which
of the following is not a generally accepted principle for implementing a
security awareness program?

Question 9
options:

Competency
should be measured.

Remind
employees of risks.

Leaders should
provide visible support.

None of the
above.

Question 10
The key to __________ is being able to measure compliance against a set of
controls.

Question 10
options:

nonrepudiation

security
policy

business
management

risk
exposure

Question 11
Which compliance law concept states that a person of legal age, capable, with
the needed facts, and without undue pressure can make an informed judgment?

Question 11
options:

Full
disclosure

Limited use
of personal data

Informed
consent

Public
interest

Question 12
Which compliance law concept states that only the data needed for a transaction
should be collected?

Question 12
options:

Public
interest

Limited use
of personal data

Opt-in/opt-out

Full
disclosure

Question 13
Of the following compliance laws, which focuses most heavily on personal
privacy?

Question 13
options:

HIPAA

GLBA

SOX

FISMA

Question 14
To which sector does the Gramm-Leach-Bliley Act apply primarily?

Question 14
options:

Medical

None of the
above

Financial

Communications

Question 15
To which sector does HIPAA apply primarily?

Question 15
options:

Medical

Financial

None of the
above

Communications

Question 16
Within the User Domain, some of the ways in which risk can be mitigated include
awareness, enforcement, and:

Question 16
options:

people.

user
access.

reward.

process.

Question 17
In which domain is virtual private networking a security control?

Question 17
options:

Remote
Access Domain

WAN Domain

Both A and
B

Neither A
nor B

Question 18
Which of the following is not true of segmented networks?

Question 18
options:

A flat
network has more controls than a segmented network for limiting traffic.

Switches,
routers, internal firewalls, and other devices restrict segmented network traffic.

Network
segmentation limits what and how computers are able to talk to each other.

By limiting
certain types of traffic to a group of computers, you are eliminating a number
of threats.

Question 19
Web graffiti as a result of Web site defacement is an issue primarily in which
IT domain?

Question 19
options:

LAN-to-WAN

Workstation

LAN

User

Question 20
How is risk reduced in the LAN-to-WAN Domain?

Question 20
options:

Setting up
a DMZ

Both A and
B

Neither A
nor B

Reviewing
logs

Question 21
In an organization, which of the following roles is accountable for approving security
policy implementation?

Question 21
options:

Compliance
officer

Executive
management

Auditor

Information
security office (ISO)

Question 22
Successful security policy implementation depends on the correct alignment of
people, processes, and __________.

Question 22
options:

time

motivation

money

technology

Question 23
In an organization, which of the following roles is accountable for monitoring
adherence to laws and regulations?

Question 23
options:

Information
security office (ISO)

Compliance
officer

Data owner

Data
custodian

Question 24
A primary reason why security policies often fail is __________.

Question 24
options:

poor
planning

lack of
complexity

insufficient
leadership support

not enough
money

Question 25
Which personality type tends to be associated with good leaders?

Question 25
options:

Attacker

Achiever

Pleaser

Analytical

Question 26
Which of the following is not a control area of ISO/IEC 27002, “Information
Technology–Security Techniques–Code of Practice for Information Security
Management”?

Question 26
options:

Risk
assessment and treatment

Asset
management

Audit and
accountability

Security
policy

Question 27
Your organization was awarded a U.S. government contract. You need to ensure
your organization adheres to an acceptable IT security framework. Which of the
following is the best choice?

Question 27
options:

None of the
above

COBIT

COSO

NIST SP
800-53

Question 28
Which of the following is one of the prime objectives of an information
security program?

Question 28
options:

Keep
policies updated

Protect
information

None of the
above

Learn about
compliance

Question 29
What does an IT security policy framework resemble?

Question 29
options:

List

Narrative
document

Cycle
diagram

Hierarchy
or tree

Question 30
Which act was passed in the wake of the collapse of Enron, Arthur Andersen,
WorldCom, and several other large firms?

Question 30
options:

SOX

FISMA

CIPA

FERPA

Question 31
Which of the following is generally not an objective of a security policy
change board?

Question 31
options:

Make and
publish approved changes to policies

Assess
policies and recommend changes

Review
requested changes to the policy framework

Coordinate
requests for changes

Question 32
Virus removal and closing a firewall port are examples of which type of
security control?

Question 32
options:

Preventive

Recovery

Detective
or response

Corrective

Question 33
When publishing an internal security policy or standard, which role or
department usually gives final approval?

Question 33
options:

Legal

Human
Resources

Audit and
Compliance Manager

Senior
Executive

Question 34
Pre-employment screening of personnel and a change management process are
examples of which type of security control?

Question 34
options:

Administrative

Physical
security

None of the
above

Technical
security

Question 35
What is the primary role of a security policy evangelist?

Question 35
options:

Monitor
user adherence to security policies

Conduct security
policy awareness training

Review
student participation in security policy awareness training

Promote
security policy awareness and address user questions

Question 36
Who has a highly restricted role and grants access rights?

Question 36
options:

None of the
above

Data security
administrator

Data
administrator

CISO

Question 37
Which security policy framework, developed by CERT, focuses on information security
assessment and planning?

Question 37
options:

COSO

COBIT

ITIL

OCTAVE

Question 38
Which IT framework extends the COBIT framework and is a comprehensive risk
management approach?

Question 38
options:

ISO 27002

ISACA Risk
IT framework

COSO

ITIL

Question 39
Who is responsible for executing policies and procedures, such as backup and
versioning?

Question 39
options:

Data
administrator

CISO

Data
custodian

Data
steward

Question 40
A fundamental component of internal control for high-risk transactions is:

Question 40
options:

following
best practices.

data
duplication.

a defense
in depth.

a
separation of duties.

Having Trouble Meeting Your Deadline?

Get your assignment on Saintleo COM590 Midterm Exam Latest 2019 JUNE completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts