Saturday, April 1, 2017

CyberSecurity: The Business of Cybersecurity Capstone - Security Programs - Quiz

Step forward in 2017: Build in-demand career skills with Coursera Step forward in 2017: Build in-demand career skills with Coursera Step forward in 2017: Build in-demand career skills with Coursera

1. Which of the following terms is described as the process of designing, implementing, and managing the use of the collected data elements to determine the effectiveness of the overall security program?
  • Baselining
  • Performance management
  • Best practices
  • Standards of due care/diligence
2.  Which of the following is NOT one of the three types of performance measures used by organizations?
  • Those that determine the effectiveness of the execution of InfoSec policy
  • Those that evaluate the compliance of non-security personnel in adhering to InfoSec policy
  • Those that assess the impact of an incident or other security event on the organization or its mission
  • Those that determine the effectiveness and/or efficiency of the delivery of InfoSec services
Online business courses to jumpstart your future. Career skills to jumpstart your future. Online learning to jumpstart your future. 

3. Which of the following has the main goal of restoring normal modes of operation with minimal cost and disruption to normal business activities after an adverse event?
  • Business response
  • Risk management
  • Contingency planning
  • Disaster readiness
4. In the event of an incident or disaster, which planning element is used to guide off-site operations?
  • Incident response
  • Business continuity
  • Project management
  • Disaster recovery
5. After an incident, but before returning to its normal duties, the CSIRT must do which of the following?
  • Restore data from backups
  • Create the incident damage assessment
  • Restore services and processes in use
  • Conduct an after-action review
Coursera Data Science Coursera Business Vertical Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more

No comments:

Post a Comment