100%(7)7 out of 7 people found this document helpful
This preview shows page 8 - 10 out of 10 pages.
QUESTION 191.____________ is a widely accepted international best practices framework for implementing information systems security. [Wrong Answer]A.Information Systems Audit and Control Association (ISACA)B.Control Objectives for Information and related Technology (COBIT)C.Business as Usual (BAU)D.Business process reengineering (BPR)4 points QUESTION 20
1.The concept of independent audits (or assessments) is that the further one is away from the actual transaction, the more unbiased and independentthe opinion that can be obtained.TrueFalse4 points QUESTION 211.Authentication is one of the most important components of the user domain, and it is necessary to determine an authentication method that makes sense for your organization. It is best to restrict access to an ID and password to one individual and ensure that users frequently change passwords.4 points QUESTION 221.Of the eight classic personality types in the workplace, commanders, can often appear angry or even hostile toward ideas and others on the team and are critical of others’ ideas.4 points QUESTION 231.Integritybroadly means limiting disclosure of information to authorizedindividuals. For example, if the principle of integrity is applied to e-mail, then you might have an objective of ensuring that all sensitive information be protected against eavesdropping. And then to implement this objective you would require that all e-mails containing sensitive information be encrypted, and then ensure that only authorized individuals have access to the decryption key.
4 points QUESTION 241.Change Management is a set of processes that are used to ensure significant changes are implemented to help individuals overcome resistanceto change, help them see value or reason for the change, and accept the change.TrueFalse4 points QUESTION 251.18. When situations arise in which your organization cannot meet one or more standards immediately, it is vitally important to recognize an exception to standards to determine where problems may exist.
You've reached the end of your free preview.
Want to read all 10 pages?
Chief information officer, chief technology officer