Sec 340 Week 1 Quiz

Published on January 2018 | Categories: Public Notices | Downloads: 152 | Comments: 0 | Views: 906
of 1
Download PDF   Embed   Report

1. (TCOs 1, 2, 4) Objects, persons, or other entities that pose a potential risk of loss to an asset are called _____. 2. (TCOs 1, 2, 4) The process of assigning a risk rating or score to an information asset is called _____. 3. (TCOs 1, 2, 4) Which part of the contingency plan provides detailed scenarios of the potential impact of each type of attack? 4. (TCOs 1, 2, 4) Which is not a role of the contingency planning management team? 5. (TCOs 1, 2, 4) Who should set the policy for the contingency planning process? 6. (TCOs 1, 2, 4) The analysis of business _____ focuses on identifying which are the main revenue-producing operations. 7. (TCOs 3, 5) Which of the following is not a possible IR team structure model? 8. (TCOs 3, 5) The circumstances that cause the IR plan to be initiated are called the _____ 9. (TCOs 3, 5) Which type of plan testing involves individuals who act as if an incident has occurred, but do so without interfering with normal operations? 10. (TCOs 3, 5) Legitimate activities wrongly reported as incident candidates are referred to as _____. Page 2 1. (TCOs 3, 5) The _____ should provide the incident response plan as its first deliverable. 2. (TCOs 3, 5) The successful execution of a _____ begins with admitting that there is a problem. 3. (TCOs 3, 5) _____ reflect upon the relative security of an information system. 4. (TCOs 3, 5) Which of the following describes confidentiality? 5. (TCOs 3, 5) There is nothing that _____ can do to improve the bottom line. 6. (TCO 1) The CNSS model of _____ evolved from a concept known as the CIA triangle. 7. (TCO 1) Which of the following can become the basis for an attack on information? 8. (TCOs 2, 4) The _____ takes up where the risk assessment process leaves off. 9. (TCO 5) When a non-event is categorized as an actual incident, it is also known as a _____. 10. (TCO 5) False positives or noise often result from which of the following causes in an incident collection candidate?

Comments

Content

1. (TCOs 1, 2, 4) Objects, persons, or other entities that pose a potential risk of loss to an asset are called _____. 2. (TCOs 1, 2, 4) The process of assigning a risk rating or score to an information asset is called _____. 3. (TCOs 1, 2, 4) Which part of the contingency plan provides detailed scenarios of the potential impact of each type of attack? 4. (TCOs 1, 2, 4) Which is not a role of the contingency planning management team? 5. (TCOs 1, 2, 4) Who should set the policy for the contingency planning process? 6. (TCOs 1, 2, 4) The analysis of business _____ focuses on identifying which are the main revenue-producing operations. 7. (TCOs 3, 5) Which of the following is not a possible IR team structure model? 8. (TCOs 3, 5) The circumstances that cause the IR plan to be initiated are called the _____ 9. (TCOs 3, 5) Which type of plan testing involves individuals who act as if an incident has occurred, but do so without interfering with normal operations? 10. (TCOs 3, 5) Legitimate activities wrongly reported as incident candidates are referred to as _____. Page 2 1. (TCOs 3, 5) The _____ should provide the incident response plan as its first deliverable. 2. (TCOs 3, 5) The successful execution of a _____ begins with admitting that there is a problem. 3. (TCOs 3, 5) _____ reflect upon the relative security of an information system. 4. (TCOs 3, 5) Which of the following describes confidentiality? 5. (TCOs 3, 5) There is nothing that _____ can do to improve the bottom line. 6. (TCO 1) The CNSS model of _____ evolved from a concept known as the CIA triangle. 7. (TCO 1) Which of the following can become the basis for an attack on information? 8. (TCOs 2, 4) The _____ takes up where the risk assessment process leaves off. 9. (TCO 5) When a non-event is categorized as an actual incident, it is also known as a _____. 10. (TCO 5) False positives or noise often result from which of the following causes in an incident collection candidate?

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close