100%(1)1 out of 1 people found this document helpful
This preview shows page 5 - 8 out of 11 pages.
Question 9In a (n) ____________________, there are policies,standards, baselines, procedures, guidelines, andtaxonomy.Selected Answer:B. Answers:A. B. C. D. IT policy frameworkasset management policyIT policy frameworkcontrol standardrisk assessment policyQuestion 1018. When situations arise in which your organizationcannot meet one or more standards immediately, itis vitally important to recognize an exception standards to determine where problems may exist.toQuestion 11There are a number of classifications that can beapplied to security controls. Which of the following isnot one the classifications?4 out of 4 points4 out of 4 points4 out of 4 points
7/7/2019Review Test Submission: Midterm Exam – Summer 2019 - ...;6/11Question 12Change Management is a set of processes that areused to ensure significant changes are implementedto help individuals overcome resistance to change,help them see value or reason for the change, andaccept the change.Question 13._______________refers to an attempt to causefear or major disruptions in a society throughhacking computers. Such attacks target governmentcomputers, major companies, or key areas of theeconomy.Selected Answer:A. Answers:A. B. C. CyberterrorismCyberterrorismGlobalizationNation-state attack4 out of 4 points4 out of 4 points
7/7/2019Review Test Submission: Midterm Exam – Summer 2019 - ...;7/11D. Sovereign warQuestion 14____________ is a widely accepted internationalbest practices framework for implementinginformation systems security.