Forensic 17 - Question 1 2 out of 2 points Why is it true...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 2 out of 2 points Why is it true in many cases, especially in ISMSs, that adequate security can be achieved only by applying multiple security standards? Answer Selected Answer: Single Security standards, even when properly implemented, generally do not lead to complete security assurances in terms of all assessment approaches and life cycle phases. focuses on a given assurance method and life cycle phase does not necessarily mean that the standard will not perform well in areas on which it does not focus. Correct Answer: Different security standards tend to focus on different things (although they often overlap each other). The result is that applying broader standards results in a broader consideration of the factors that lead to better security. Response Feedback: [None Given] Question 2 1 out of 2 points Can information security be adequately achieved in ISMSs with low levels of maturity? Answer Selected Answer: Yes ISMS can have information that will be adequately achieved with low levels of maturity. Correct
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Answer: Yes, possibly in some very simple situations, though not likely. Such an ISMS would probably be inefficient and not very congruent with the overall company security policy. Response Feedback: Yes, possibly in some very simple situations, though not likely. Such an ISMS would probably be inefficient and not very congruent with the overall company security policy. Question 3 1 out of 2 points Explain the benefits of an ISMS becoming mature under the CMM. Answer Selected Answer: One of the primary benefits maturity of a given process. assessing and improving processes. The word maturity in CMM stems from the premise that processes exist in varying levels of maturity ranging from ad hoc and very immature to well defined, organized, and mature. Initial, repeatable, defined, managed and optimizing. Correct
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/29/2012 for the course FORENSIC 101 taught by Professor ? during the Spring '12 term at Post.

Page1 / 5

Forensic 17 - Question 1 2 out of 2 points Why is it true...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online