Business leaders rely on technology roles to be accountable for implementing

Business leaders rely on technology roles to be

This preview shows page 3 - 4 out of 4 pages.

QUESTION 15Business leaders rely on technology roles to be accountable for implementing security policies,monitoring their adherence, and managing day-to-day activities. The role of ______________, forexample, is to be accountable for ensuring only the access that is needed to perform day-to-dayoperations is granted4 points SavedSaved data ownerdata managerdata userdata custodian QUESTION 16 Security controls are measures taken to protect systems from attacks on the integrity, confidentiality,and availability of the system. If a potential employee is required to undergo a drug screening, which ofthe following controls is being conducted? 4 points Saved Saved QUESTION 17 In order to be thoughtful about the implementation of security policies and controls, leaders mustbalance the need to reduce______________ with the impact to the business operations. Doing socould mean phasing security controls in over time or be as simple as aligning security implementationwith the business’s training events. 4 points Saved Saved QUESTION 18 Which of the following topics describes the process of building security into applications? 4 points Saved Saved QUESTION 19 The ________________ domain ensures risks are diminished and remediated in the most cost-effective manner. To prevent risk from increasing in severity and scope, this domain coordinates riskresponses ensuring that the right people are engaged when appropriate. risk responserisk governancerisk evaluationrisk acceptance 4 points Saved QUESTION 20 In a large organization, the complexity required to keep operations running effectively requires ahierarchy of specialties. Thus, which of following organizational structures is preferred? 4 points Saved Save All Answe Save All Answe Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Image of page 3
9/22/2019 Take Test: Quiz 2 – Fall 2019 - Operations Security (... ; 4/4
Image of page 4

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture