1. Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls.
- Persecution
- Deterrence
- Rehabilitation
- Remediation
2. Which type of security policy is intended to provide a common understanding of the purposes for which an employee can and cannot use a resource?
- system-specific
- enterprise information
- user-specific
- issue-specific
3. Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk?
- Risk assessment
- Risk management
- Systems testing
- Vulnerability assessment
4. Which of the following describes an organization’s efforts to reduce damage caused by a realized incident or disaster?
- transference
- avoidance
- acceptance
- mitigation
5. Which of the following terms is described as the process of designing, implementing, and managing the use of the collected data elements to determine the effectiveness of the overall security program?
- Baselining
- Performance management
- Standards of due care/diligence
- Best practices
No comments:
Post a Comment