Posts

Chapter 4 - Business Challenges Within the Seven Domains of IT Responsibility

Answers 1.   B 2.   A 3.   C 4.   C 5.   LAN-to-WAN Domain 6.   A 7.   Segmented network 8.   A 9.   B 10.   B 11.   D 12.   B 13.   C 14.   B 15.   C 16.   Concentrators 17.   C 18.   IDs and Passwords 1.  Private WANs must be encrypted at all times. True False 2.  Which of the following attempts to identify where sensitive data is currently stored? Data Leakage Protection Inventory DLP Encryption Key Data Loss Protection Perimeter DLP Trojans 3.  Voice over Internet Protocol (VoIP) can be used over which of the following? LAN WAN Both Neither 4.  Which of the following is not one of the seven domains of typical IT infrastructure? Remote Access Domain LAN Domain World Area Network Domain System/Application Doma...

Chapter 3 - U.S. Compliance Laws and Information Security Policy Requirements

Answers 1.   B 2.   E 3.   E 4.   D 5.   Cyberterrorism or cyberwarfare 6.   B 7.   CIPA 8.   B 9.   B 10.   B 11.   D 12.   D 1.  When creating laws and regulations, the government's sole concern is the privacy of the individual. True False 2.  Which of the following are pressures on creating security policies? Shareholder value Regulations Technology vulnerabilities and limitations B and C only All of the above 3.  Which of the following laws require proper security controls for handling privacy data? HIPAA GLBA FERPA B and C Only All of the above 4.  Which of the following are control objectives for PCI DSS? Maintain an information security policy Protect cardholder data Alert when credit cards are illegally used A and B only None of the above 5....

Chapter 1 - Information Systems Security Policy Management

Answers 1.   C 2.   Standards 3.   A 4.   D and E 5.   Procedure 6.   D 7.   C 8.   Human 9.   E 10.   B 11.   E 1.  John works in the accounting department but travels to other company locations. He must present the past quarter's figures to the chief executive officer (CEO) in the morning. He forgot to update the PowerPoint presentation on his desktop computer at the main office. What is at issue here? Unauthorized access to the system Integrity of the data Availability of the data Nonrepudiation of the data Unauthorized use of the system 2.  Governance is the practice of ensuring an entity is in conformance to policies, regulations, ________, and procedures. 3.  COBIT is a widely accepted international best practices policy framework. True False 4.  Which of the following are generally accepted as IA...