ISS policies ensure the consistent protection of information flowing through

Iss policies ensure the consistent protection of

This preview shows page 2 - 3 out of 16 pages.

QUESTION 5 ISS policies ensure the consistent protection of information flowing through the entire system. Which ofthe following is not one of the foundational reasons for using and enforcing security policies? protecting systems from the insider threatprotecting information at rest and in transitcontrolling change to IT infrastructurecompliance controls for legal mandates 2.00000 points Save Answer QUESTION 6 The COBIT Monitor, Evaluate, and Assess domain phase looks at specific business requirements andstrategic direction and determines if the system still meets these objectives. 2.00000 points Save Answer Save Answer QUESTION 7 The concept of independent audits (or assessments) is that the further one is away from the actualtransaction, the more unbiased and independent the opinion that can be obtained. 2.00000 points Save Answer QUESTION 8 Which statement most clearly contrasts the difference between policies and procedures? 2.00000 points Save Answer Save Answer TrueFalse QUESTION 9 Authentication is the ability to verify the identity of a user or device and is a concept that explicitlyapplies to human users. 2.00000 points Save Answer Save Answer QUESTION 10 In general, the enforcement of policies among employees is far less challenging than policyacceptance. 2.00000 points Save Answer QUESTION 11 Good governance provides assurance and confidence that rules are being followed; governance existsfor the purpose of providing assurance to regulators that risks to shareholders, customers, and thepublic are being properly managed. 2.00000 points Save Answer Save Answer QUESTION 12 Business process reengineering (BPR) is comprised of five phases: 1) Planning; 2) Create/Refine; 3)
Image of page 2
Image of page 3

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture