Review Test Submission_ Mid-Term CS \u2013 Fall 2019 - .._.pdf - Review Test Submission Mid-Term CS \u2013 Fall 2019 Vignan Dundangi Home H Content Week 9 14

Review Test Submission_ Mid-Term CS u2013 Fall 2019 -...

This preview shows page 1 - 4 out of 14 pages.

10/27/2019 Review Test Submission: Mid-Term CS – Fall 2019 - ... ; 1/14 Content Week 9 Review Test Submission: Mid-Term CS H Review Test Submission: Mid-Term CS Review Test Submission: Mid-Term CS User Vignan Dundangi Course Fall 2019 - Operations Security (ISOL-631-40) (ISOL-631- 42) - Combined - Full Term Test Mid-Term CS Started 10/27/19 10:18 AM Submitted 10/27/19 11:06 AM Due Date 10/27/19 11:59 PM Status Completed Attempt Score 96 out of 100 points Time Elapsed 47 minutes out of 3 hours Results Displayed Submitted Answers Question 1 Selected Answer: It is important to create an IT security program structure that aligns with program and organizational goals and describes the operating and risk environment. Which of the following is one of the important issues for the structure of the information security program? Management and coordination of security-related resources Question 2 Because it takes time to change an organization’s culture, the ISO must continually monitor security policy compliance. The ISO reports to leadership on the current effectiveness of the security policies and will also have to ask the business to accept any residual risk or come up with a way to reduce it. Home Courses 2 out of 2 points 2 out of 2 points Vignan Dundangi 14
Image of page 1
10/27/2019 Review Test Submission: Mid-Term CS – Fall 2019 - ... ; 2/14 Selected Answer: True Question 3 Selected Answer: False In an attribute based access control (ABAC) model, roles assigned are static, whereas in a role based access control (RBAC), roles are built more dynamically. Question 4 Selected Answer: Although an organization’s list of stakeholders will vary depending on the policy being implemented, there are stakeholders who can be seen commonly across organizations. What is the key focus of stakeholders in information security ? protection of the company and the customer Question 5 Selected Answer: Apathy can have detrimental effects on information security. Engaged communication is one strategy that can be implemented to overcome the effects of apathy. Which of the following statements further elaborates this strategy? Adjust the implementation strategy to better explain the importance of the policy within the context of the individual role. Question 6 Selected Answer: False In the COBIT Build, Acquire, and Implement domain, the staff tunes the environment to minimize risks and collects lessons learned. 2 out of 2 points 2 out of 2 points 2 out of 2 points 2 out of 2 points
Image of page 2
10/27/2019 Review Test Submission: Mid-Term CS – Fall 2019 - ... ; 3/14 Question 7 Selected Answer: Which of the following is one of the challenges of the Sarbanes-Oxley (SOX) Act?
Image of page 3
Image of page 4

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture