Connect the classification to particular handling requirements Make

Connect the classification to particular handling

This preview shows page 18 - 23 out of 24 pages.

Connect the classification to particular handling requirements. Make recommendations for how audits can be conducted. A. B. C. D. QUESTION 36 An organization’s _______________________ is a particular group of di # erently skilled individuals who are responsible for attending to serious security situations. incident response team (IRT) business impact analysis team (BIAT) disaster recovery plan team (DRPT) information technology subject matter experts (ITSME ) 2 points Saved QUESTION 37 The initial step in creating a business continuity and security response plan is a _________________, which 2 points Saved
Image of page 18
8/15/20, 5 : 40 PM Take Test: ISOL 631 Final Exam – Summer 2020 - ... Page 19 of 24 A. B. C. D. can be used to assemble the business and security responses in order to diminish losses. business assessment component assessment component priority business impact analysis A. B. C. D. QUESTION 38 In information security, the individual responsible for setting goals for implementing security policies is the _________________. chief information security o " cer supervisor human resources manager executive manager 2 points Saved A. B. QUESTION 39 What is the main di # erence between a law and a regulation ? Security policies try to comply with regulatory requirements. Regulation requirements create procedures for determining legal thresholds. 2 points Saved
Image of page 19
8/15/20, 5 : 40 PM Take Test: ISOL 631 Final Exam – Summer 2020 - ... Page 20 of 24 C. D. Regulations have authority that derives from the original law. Laws institute legal thresholds. A. B. C. D. QUESTION 40 It is important that security policies establish a concrete distinction between work life and home life. Such a distinction requires that employees understand that they have no expectation of _______________. job security using company devices after hours vulnerability from threats privacy with respect to personal devices connected to the network 2 points Saved A. B. C. QUESTION 41 One of the di # erent manual controls necessary for managing risk is ________________, which is a type of formal management veri ! cation. In the process, management con ! rms that a condition is present and that security controls and policies are in place. attestation background checks 2 points Saved
Image of page 20
8/15/20, 5 : 40 PM Take Test: ISOL 631 Final Exam – Summer 2020 - ... Page 21 of 24 D. log reviews access rights reviews A. B. C. D. QUESTION 42 A security _____________identi ! es a group of fundamental con ! gurations designed to accomplish particular security objectives. baseline policy guideline system 2 points Saved A. B. C. D. QUESTION 43 The window of ________________ is the time between when an opportunity for risk is identi ! ed and when the risk is ultimately eliminated by a patch. threat risk vulnerability danger 2 points Saved QUESTION 44 2 points Saved
Image of page 21
8/15/20, 5 : 40 PM Take Test: ISOL 631 Final Exam – Summer 2020 - ...
Image of page 22
Image of page 23

You've reached the end of your free preview.

Want to read all 24 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture