98%(218)213 out of 218 people found this document helpful
This preview shows page 3 - 7 out of 19 pages.
Question 92 out of 2 pointsOne of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an
organization?Question 102 out of 2 pointsThe Barings Bank collapsed in 1995 after it was found that an employee had lost over $1.3 billion of the bank’s assets on the market. The collapse occurred when an arbitrage trader was responsible for both managing trades and guaranteeing that trades were settled and reported according to proper procedures. To which of the following causes is this collapse attributed?Question 112 out of 2 pointsWhich of the following is notone of the types of control partners?Question 120 out of 2 points
Of all the reasons that people commit errors when it comes to IT security, which of the following is the main reason people make mistakes?Question 132 out of 2 pointsOne of the processes designed to eradicate maximum possible security risks is to ________________, which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals.Question 142 out of 2 pointsWhich of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning?Question 150 out of 2 points
There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is notan automated control?Question 162 out of 2 pointsThere are number of issues to consider when composing security policies. One such issue concerns the use of security devices. One such device is a ____________, which is a network security device with characteristics of a decoy that serves as a target that might tempt a hacker.
You've reached the end of your free preview.
Want to read all 19 pages?
Correct Answer, Chief Information Security Officer