{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Forensic 17 - Question 1 2 out of 2 points Why is it true...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 2 out of 2 points Why is it true in many cases, especially in ISMSs, that adequate security can be achieved only by applying multiple security standards? Answer Selected Answer: Single Security standards, even when properly implemented, generally do not lead to complete security assurances in terms of all assessment approaches and life cycle phases. focuses on a given assurance method and life cycle phase does not necessarily mean that the standard will not perform well in areas on which it does not focus. Correct Answer: Different security standards tend to focus on different things (although they often overlap each other). The result is that applying broader standards results in a broader consideration of the factors that lead to better security. Response Feedback: [None Given] Question 2 1 out of 2 points Can information security be adequately achieved in ISMSs with low levels of maturity? Answer Selected Answer: Yes ISMS can have information that will be adequately achieved with low levels of maturity. Correct
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Answer: Yes, possibly in some very simple situations, though not likely. Such an ISMS would probably be inefficient and not very congruent with the overall company security policy. Response Feedback: Yes, possibly in some very simple situations, though not likely. Such an ISMS would probably be inefficient and not very congruent with the overall company security policy. Question 3 1 out of 2 points Explain the benefits of an ISMS becoming mature under the CMM. Answer Selected Answer: One of the primary benefits maturity of a given process. assessing and improving processes. The word maturity in CMM stems from the premise that processes exist in varying levels of maturity ranging from ad hoc and very immature to well defined, organized, and mature. Initial, repeatable, defined, managed and optimizing.
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern