SEC402 Final Exam

  

Don't use plagiarized sources. Get Your Custom Essay on
SEC402 Final Exam
Just from $13/Page
Order Essay

· Question 1

2.5 out of 2.5 points

       

The   ____ for a purchase marks the start of the secure procurement process.

  

· Question 2

2.5 out of 2.5 points

       

In   order to ensure that the strategic management plan is composed of tangible   activities, it is documented using a ____ process.

  

· Question 3

2.5 out of 2.5 points

       

____   maintains an integrated set of organization-wide security controls along with   associated technical countermeasures.

  

· Question 4

0 out of 2.5 points

       

Because   of its purpose, the ____ stage is the appropriate place for cybersecurity   professionals to be involved in software assurance.

  

· Question 5

2.5 out of 2.5 points

       

____   data about the performance of security processes and technologies can give   managers all of the guidance they need to make informed decisions about how   to steer the course.

  

· Question 6

2.5 out of 2.5 points

       

____   functionality is almost always put in the code that way for a malicious   reason.

  

· Question 7

0 out of 2.5 points

       

____   risk and the consequent losses is probably the most common approach to risk   handling, because many risks pass through the risk management function   unidentified, or unacknowledged.

  

· Question 8

2.5 out of 2.5 points

       

The   ____ process gathers and uses information from all available sources in order   to decrease the possibility of overall risks to information assets.

  

· Question 9

0 out of 2.5 points

       

A   ____ model serves as the essential basis for effective management of a   software operation.

  

· Question 10

2.5 out of 2.5 points

       

The   ____ provides an unambiguous statement of how the company will coordinate and   control its information security practice.

  

· Question 11

2.5 out of 2.5 points

       

A   ____ spells out the specific steps that need to be taken to ensure that the   organization can continue to meet its security goals.

  

· Question 12

2.5 out of 2.5 points

       

In   the case of every one of the EBK security functions, the ____ stage creates a   framework of concrete security procedures and practices, which then serve as   the basis for executing the process in the real world.

  

· Question 13

0 out of 2.5 points

       

____   is a continuous process when it comes to ensuring the integrity of the   security system.

  

· Question 14

2.5 out of 2.5 points

       

The   actual planning for the response to a threat takes place once the threat   situation is ____.

  

· Question 15

2.5 out of 2.5 points

       

The   ____ level of the capability maturity process is characterized by conscious   awareness of security practice.

  

· Question 16

2.5 out of 2.5 points

       

The   goal of the ____ function is to ensure a reliable level of secure practice   across the entire organization.

  

· Question 17

2.5 out of 2.5 points

       

____   targets the general user community.

  

· Question 17

2.5 out of 2.5 points

       

____   targets the general user community.

  

· Question 19

2.5 out of 2.5 points

       

____   has been achieved if the level of the organization’s community understanding   and discourse is raised.

  

· Question 20

2.5 out of 2.5 points

       

The   standard acceptable use policy begins with a statement of ____ goals and   objectives.

  

· Question 21

2.5 out of 2.5 points

       

____   need a different set of acceptable use policies because of their enhanced   authority.

  

· Question 22

2.5 out of 2.5 points

       

Audit-based   intrusion detection depends on data in ____.

  

· Question 23

2.5 out of 2.5 points

       

____   allows users who are outside the physical boundaries of the network to access   the network and its resources.

  

· Question 24

2.5 out of 2.5 points

       

The   first step in ensuring a permanent trust is to delineate the company’s ____.

  

· Question 25

2.5 out of 2.5 points

       

When   it comes to user access, one of the more important personnel security issues   is the need to keep ____ authorizations up to date.

  

· Question 26

2.5 out of 2.5 points

       

The   ____ boundaries demarcate the physical space that the organization intends to   control.

  

· Question 27

2.5 out of 2.5 points

       

Logically,   the entry point into the process of assigning privileges to company roles is   the ____ process.

  

· Question 28

2.5 out of 2.5 points

       

The   ____ encompasses those principles, policies, and procedures that ensure essential   business functions in the event of a disaster.

  

· Question 29

2.5 out of 2.5 points

       

The   ____ is assigned based on the criticality of the component in the overall   business process.

  

· Question 30

2.5 out of 2.5 points

       

The   ____ documents all of the organization’s assumptions about continuity and has   to be based on a careful analysis of the various business circumstances and   environmental conditions for a given organization.

  

· Question 31

2.5 out of 2.5 points

       

____   itemizes and describes all foreseeable contingencies that might impact the   organization.

  

· Question 32

2.5 out of 2.5 points

       

The   key to success in continuity is ____.

  

· Question 33

2.5 out of 2.5 points

       

The   ____ process maintains accountability by accumulating evidence to support   conclusions about the target.

  

· Question 34

2.5 out of 2.5 points

       

An   incident response procedure is then set in motion through a(n) ____ process.

  

· Question 35

2.5 out of 2.5 points

       

The   ____ function integrates the incident response activities into a substantive   and appropriate response to each adverse event as it happens.

  

· Question 36

2.5 out of 2.5 points

       

The   role of the ____ function is to ensure that adequate preparation has been   done to underwrite the success of the organization’s response to an incident.

  

· Question 37

2.5 out of 2.5 points

       

Much   of the work that is involved in gathering information about an incident is   done through the use of ____.

  

· Question 38

2.5 out of 2.5 points

       

____   are typically composed of all of the physical items that might need to be   factored into the protection scheme, including all equipment and other   physical property.

  

· Question 39

2.5 out of 2.5 points

       

There   are normally three classes of items in each of the physical security   management baselines: equipment, people, and the ____.

  

· Question 40

2.5 out of 2.5 points

       

Control   of the human resources is really the duty of the ____ function.

Order your essay today and save 15% with the discount code: APRICOT

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal
error: Content is protected !!
Live Chat+1(405) 367-3611Email