IT Security and Risk Management Final Exam Questions - 706 Verified Questions

Page 1


IT Security and Risk Management

Final Exam Questions

Course Introduction

IT Security and Risk Management explores the principles, practices, and technologies used to protect information assets within organizations. The course examines risk assessment methodologies, threat analysis, and strategies for mitigating security risks. Topics include security policies and frameworks, legal and ethical considerations, incident response, vulnerability management, and business continuity planning. Students will gain practical knowledge on identifying security threats, managing vulnerabilities, and implementing controls that support organizational objectives, while aligning with industry standards and regulatory requirements.

Recommended Textbook Management of Information Security 5th Edition by Michael E. Whitman

Available Study Resources on Quizplus

12 Chapters

706 Verified Questions

706 Flashcards

Source URL: https://quizplus.com/study-set/2555

Page 2

Chapter 1: Introduction to the Management of Information Security

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/50835

Sample Questions

Q1) One form of e-mail attack that is also a DoS attack is called a mail spoof,in which an attacker overwhelms the receiver with excessive quantities of e-mail.

A)True

B)False

Answer: False

Q2) What do audit logs that track user activity on an information system provide?

A) identification

B) authorization

C) accountability

D) authentication

Answer: C

Q3) ____________________ is unsolicited commercial e-mail.

Answer: Spam

Q4) Which of the following is not among the 'deadly sins of software security'?

A) Extortion sins

B) Implementation sins

C) Web application sins

D) Networking sins

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Compliance: Law and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/50836

Sample Questions

Q1) Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.

Answer: cultural mores

Q2) Information ____________ occurs when pieces of non-private data are combined to create information that violates privacy.

Answer: aggregation

Q3) regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments

A)criminal law

B)public law

C)ethics

D)Computer Security Act (CSA)

E)Electronic Communications Privacy Act

F)Cybersecurity Act

G) normative ethics

H) applied ethics

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Governance and Strategic Planning for Security

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/50837

Sample Questions

Q1) The individual accountable for ensuring the day-to-day operation of the InfoSec program,accomplishing the objectives identified by the CISO and resolving issues identified by technicians are known as a(n)____________.

A) chief information security officer

B) security technician

C) security manager

D) chief technology officer

Answer: C

Q2) Contrast the vision statement with the mission statement.

Answer: If the vision statement states where the organization wants to go,the mission statement describes how it wants to get there.

Q3) In ____________________

testing,security personnel simulate or perform specific and controlled attacks to compromise or disrupt their own systems by exploiting documented vulnerabilities.

Answer: penetration

Q4) _________resources include people,hardware,and the supporting system elements and resources associated with the management of information in all its states.

Answer: Physical

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: Information Security Policy

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/50838

Sample Questions

Q1) An organizational policy that provides detailed,targeted guidance to instruct all members of the organization in the use of a resource,such as one of its processes or technologies.

A) capability table

B) statement of purpose

C) Bull's eye model

D) SysSP

E) Procedures

F) InfoSec policy

G) standard

H) access control lists

I) systems management

J) ISSP

Q2) What are configuration rules?  Provide examples.

Q3) Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?

A) can suffer from poor policy dissemintation, enforcement, and review

B) may skip vulnerabilities otherwise reported

C) may be more expensive than necessary

D) implementation can be less difficult to manage

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Developing the Security Program

Available Study Resources on Quizplus for this Chatper

65 Verified Questions

65 Flashcards

Source URL: https://quizplus.com/quiz/50839

Sample Questions

Q1) ____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.

Q2) An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.

Q3) The work breakdown structure (WBS)can only be prepared with a complex specialized desktop PC application.

A)True

B)False

Q4) What is the Chief Information Security Office primarily responsible for?

Q5) In the early stages of planning,the project planner should attempt to specify completion dates only for major employees within the project.

A)True

B)False

Q6) An organization's information security program refers to the entire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information  _______ of the organization.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Risk Management: Identifying and Assessing Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50840

Sample Questions

Q1) As part of the risk identification process,listing the assets in order of importance can be achieved by using a weighted ____________________ worksheet.

Q2) MAC addresses are considered a reliable identifier for devices with network interfaces,since they are essentially foolproof.

A)True

B)False

Q3) Describe the use of an IP address when deciding which attributes to track for each information asset.

Q4) The information technology management community of interest often takes on the leadership role in addressing risk.

A)True

B)False

Q5) List the stages in the risk identification process in order of occurrence.

Q6) An approach to combining risk identification,risk assessment,and risk appetite into a single strategy.is known as risk protection.

A)True

B)False

Q7) What are the included tasks in the identification of risks?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Risk Management: Controlling Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50841

Sample Questions

Q1) What should each information asset-threat pair have at a minimum that clearly identifies any residual risk that remains after the proposed strategy has been executed?

A) probability calculation

B) documented control strategy

C) risk acceptance plan

D) mitigation plan

Q2) Which of the following determines acceptable practices based on consensus and relationships among the communities of interest.

A) organizational feasibility

B) political feasibility

C) technical feasibility

D) operational feasibility

Q3) Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?

A) incident response plan

B) business continuity plan

C) disaster recovery plan

D) damage control plan

To view all questions and flashcards with answers, click on the resource link above.

9

Chapter 8: Security Management Models

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50842

Sample Questions

Q1) Information Technology Infrastructure Library provides guidance in the development and implementation of an organizational InfoSec governance structure.

A)True

B)False

Q2) According to COSO,internal control is a process designed to provide reasonable assurance regarding the achievement of objectives in what three categories?

Q3) Access controls are build on three key principles. List and briefly define them.

Q4) Lattice-based access controls use a two-dimensional matrix to assign authorizations,what are the two dimensions and what are they called?

Q5) Which of the following provides advice about the implementation of sound controls and control objectives for InfoSec,and was created by ISACA and the IT Governance Institute?

A) COBIT

B) COSO

C) NIST

D) ISO

Q6) Under what circumstances should access controls be centralized vs.decentralized?

To view all questions and flashcards with answers, click on the resource link above.

Page 10

Chapter 9: Security Management Practices

Available Study Resources on Quizplus for this Chatper

59 Verified Questions

59 Flashcards

Source URL: https://quizplus.com/quiz/50843

Sample Questions

Q1) A company striving for 'best security practices' makes every effort to establish security program elements that meet every minimum standard in their industry.

A)True

B)False

Q2) Compare and contrast accreditation and certification.

Q3) The data or the trends in data that may indicate the effectiveness of security countermeasures or controls-technical and managerial-implemented in the organization.

A) Accreditation

B) Baseline

C) Benchmarking

D) Certification

E) due diligence

F) best security practices

G) recommended business practices

H) standard of due care

I) performance measurements

J) NIST SP 800-37

Q4) Describe the three tier approach of the RMF as defined by NIST SP 800-37.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Planning for Contingencies

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50844

Sample Questions

Q1) A(n)____________________ occurs when an attack affects information resources and/or assets,causing actual damage or other disruptions.

Q2) In the event of an incident or disaster,which planning element is used to guide off-site operations?

A) Project management

B) Business continuity

C) Disaster recovery

D) Incident response

Q3) A(n)wrap-up review is a detailed examination and discussion of the events that occurred during an incident or disaster,from first detection to final recovery.

A)True

B)False

Q4) List the seven steps of the incident recovery process according to Donald Pipkin.

Q5) Which document must be changed when evidence changes hands or is stored?

A) Chain of custody

B) Search warrant

C) Affidavit

D) Evidentiary material

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Personnel and Security

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50845

Sample Questions

Q1) Temporary workers-often called temps-may not be subject to the contractual obligations or general policies that govern other employees.

A)True

B)False

Q2) provide the policies,guidelines,and standards,performing conulting and risk assessment and develop technical architectures

A) Definers

B) Builders

C) security manager

D) security technician

E) systems programmer

F) ethics officer

G) CISSP

H) SSCP

I) SANS

J) CCE

Q3) Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?

Q4) What are some of the common qualifications for a CISO?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Protection Mechanisms

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/50846

Sample Questions

Q1) A software program or hardware/software appliance that allows administrators to restrict content that comes into or leaves a network-for example,restricting user access to Web sites with material that is not related to business,such as pornography or entertainment.

A) VPN

B) transport mode

C) SSL

D) PKI

E) digital certificate

F) asymmetric encryption

G) Vernam cipher

H) transposition cipher

I) content filter

J) footprinting

Q2) Describe in basic terms what an IDPS is.

Q3) ____________________ presents a threat to wireless communications,a practice that makes it prudent to use a wireless encryption protocol to prevent unauthorized use of your Wi-Fi network.

Q4) A(n)____________________ is a secret word or combination of characters known only by the user.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
IT Security and Risk Management Final Exam Questions - 706 Verified Questions by Quizplus - Issuu