欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > PPT文档下载  

    《安全管理习题讲解》PPT课件.ppt

    • 资源ID:5493064       资源大小:217KB        全文页数:53页
    • 资源格式: PPT        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    《安全管理习题讲解》PPT课件.ppt

    QUIZ,1 Which of the following is not a responsibility of a database administrator?A Maintaining databasesB Implementing access rules to databasesC Reorganizing databasesD Providing access authorization to databases,D,QUIZ,2 According to governmental data classification levels,how would answers to tests and health care information be classified?A ConfidentialB Sensitive but unclassifiedC Private D Unclassified,B,QUIZ,3.According to private sector data classification levels,how would salary levels and medical information be classified?A Confidential B Public C Private D Sensitive,C,QUIZ,4 Which of the next are steps of a common development process of creating a security policy,standards and procedures?A design,development,publication,coding,testing B design,evaluation,approval,publication,implementation C initial and evaluation,development,approval,publication,implementation,maintenance D feasibility,development,approval,implementation,integration,C,5 What is the main purpose of a security policy?A to transfer the responsibility for the information security to all users of the organizationB to provide detailed steps for performing specific actionsC to provide a common framework for all development activitiesD to provide the management direction and support for information security,D,6 Which of the following department managers would be best suited to oversee the development of an information security policy?A Security administrationB Human resourcesC Business operationsD Information systems,C,7 Which of the following is not a responsibility of an information owner?A Running regular backups and periodically testing the validity of the backup data.B Delegate the responsibility of data protection to data custodians.C Periodically review the classification assignments against business needs.D Determine what level of classification the information requires.,A,8 Which of the following is not a goal of integrity?A Prevention of the modification of information by unauthorized users.B Prevention of the unauthorized or unintentional modification of information by authorized users.C Prevention of the modification of information by authorized users.D Preservation of the internal and external consistency.,C,9 Why do many organizations require every employee to take a mandatory vacation of a week or more?A To lead to greater productivity through a better quality of life for the employee.B To reduce the opportunity for an employee to commit an improper or illegal act.C To provide proper cross training for another employee.D To allow more employees to have a better understanding of the overall system.,B,10 Which of the following would best relate to resources being used only for intended purposes?A AvailabilityB IntegrityC ReliabilityD Confidentiality,A,11 Security of computer-based information systems is which of the following?A technical issue B management issue C training issue D operational issue,B,12 Which of the following would be the first step in establishing an information security program?A Development and implementation of an information security standards manual.B Development of a security awareness-training program for employees.C Purchase of security access control software.D Adoption of a corporate information security policy statement.,D,13 Which of the following tasks may be performed by the same person in a well-controlled information processing facility/computer center?A Computer operations and system development B System development and change management C System development and systems maintenance D Security administration and change management,C,14 Computer security should not:A Cover all identified risks.B Be cost-effective.C Be examined in both monetary and non-monetary terms.D Be proportionate to the value of IT systems.,A,15 Which of the following is most concerned with personnel security?A Management controls B Human resources controls C Technical controls D Operational controls,D,16 Which of the following is most likely given the responsibility of the maintenance and protection of the data?A Security administrator B User C Data custodian D Data owner,C,17 Who is responsible for providing reports to the senior management on the effectiveness of the security controls?A Information systems security professionals B Data owners C Data custodians D Information systems auditors,D,18 Risk mitigation and risk reduction controls can be of which of the following types?A preventive,detective,or correctiveB Administrative,operational or logicalC detective,correctiveD preventive,corrective and administrative,A,19 Which of the following would best classify as a management control?A Review of security controls B Documentation C Personnel security D Physical and environmental protection,A,20 What is the goal of the Maintenance phase in a common development process of a security policy?A to present document to approving body B to write proposal to management that states the objectives of the policy C publication within the organization D to review of the document on the specified review date,D,21 Which approach to a security program makes sure that the people actually responsible for protecting the companys assets are driving the program?A The top-down approach B The bottom-up approach C The technology approach D The Delphi approach,A,22 The preliminary steps to security planning include all of the following EXCEPT which of the following?A Determine alternate courses of action B Establish a security audit function.C Establish objectives.D List planning assumptions.,B,23IT security measures should:A Be tailored to meet organizational security goals.B Make sure that every asset of the organization is well protected.C Not be developed in a layered fashion.D Be complex,A,24 Which of the following embodies all the detailed actions that personnel are required to follow?A Baselines B Procedures C Guidelines D Standards,B,25 Which of the following should NOT be addressed by employee termination practices?A Deletion of assigned logon-ID and passwords to prohibit system access.B Return of access badges.C Employee bonding to protect against losses due to theft.D Removal of the employee from active payroll files.,C,26 Preservation of confidentiality information systems requires that the information is not disclosed to:A Authorized persons and processes B Unauthorized persons.C Unauthorized persons or processes.D Authorized person,C,27 Which of the following statements pertaining to quantitative risk analysis is false?A It requires a high volume of informationB It involves complex calculationsC It can be automatedD It involves a lot of guesswork,D,28 All except which of the follow are not used to ensure integrity?A compliance monitoring services B intrusion detection services C communications security management D firewall services,A,29 Which of the following would violate the Due Care concept?A Latest security patches for servers only being installed once a week B Network administrator not taking mandatory two-week vacation as planned C Security policy being outdated D Data owners not laying out the foundation of data protection,D,30 What does residual risk mean?A Weakness of an assets which can be exploited by a threat B Risk that remains after risk analysis has has been performed C The result of unwanted incident D The security risk that remains after controls have been implemented,D,31 Which of the following questions should any user not be able to answer regarding their organizations information security policy?A Where is the organizations security policy defined?B Who is involved in establishing the security policy?C What are the actions that need to be performed in case of a disaster?D Who is responsible for monitoring compliance to the organizations security policy?,C,32 In a properly segregated environment,which of the following tasks is compatible with the task of security administrator?A Data entry B Systems programming C Quality assurance D Applications programming,C,33 The major objective of system configuration management is which of the following?A system maintenanceB system trackingC system stabilityD system operations,C,34 In an organization,an Information Technology security function should:A Be independent but report to the Information Systems function.B Be lead by a Chief Security Officer and report directly to the CEO.C Report directly to a specialized business unit such as legal,corporate security or insurance.D Be a function within the information systems function of an organization.,B,35 Who should measure the effectiveness of security related controls in an organization?A the central security manager B the local security specialist C the systems auditor D the business manager,C,36 What is a difference between Quantitative and Qualitative Risk Analysis?A fully qualitative analysis is not possible,while quantitative is B quantitative provides formal cost/benefit analysis and qualitative not C there is no difference between qualitative and quantitative analysis D qualitative uses strong mathematical formulas and quantitative not,B,37 How is Annualized Loss Expectancy(ALE)derived from a treat?A ARO x(SLE-EF)B SLE x ARO C SLE/EF D AV x EF,B,38 One purpose of a security awareness program is to modify:A attitudes of employees with sensitive data.B corporate attitudes about safeguarding data.C employees attitudes and behaviors.D managements approach.,C,39 Controls are implemented to:A eliminate risk and reduce the potential for loss B mitigate risk and eliminate the potential for loss C eliminate risk and eliminate the potential for loss D mitigate risk and reduce the potential for loss,D,40 Who should decide how a company should approach security and what security measures should be implemented?A The information security specialistB AuditorC Senior managementD Data owner,C,41 Which of the following is the weakest link in a security system?A People B Communications C Hardware D Software,A,42 ISO 17799 is a standard for:A Information Security ManagementB Implementation and certification of basic security measuresC Certification of public key infrastructuresD Evaluation criteria for the validation of cryptographic algorithms,A,43Who of the following is responsible for ensuring that proper controls are in place to address integrity,confidentiality,and availability of IT systems and data?A Business and functional managersB Chief information officerC IT Security practitionersD System and information owners,D,44 Related to information security,the guarantee that the message sent is the message received is an example of which of the following?A integrityB identityC availabilityD confidentiality,A,45 Which one of the following represents an ALE calculation?A asset value x loss expectancy B actual replacement cost-proceeds of salvage C gross loss expectancy x loss frequency D single loss expectancy x annualized rate of occurrence,D,46 Which of the following choices is NOT part of a security policy?A description of specific technologies used in the field of information securityB definition of overall steps of information security and the importance of securityC statement of management intend,supporting the goals and principles of information securityD definition of general and specific responsibilities for information security management,A,47 Which of the following statements pertaining to a security policy is incorrect?A It must be flexible to the changing environment.B Its main purpose is to inform the users,administrators and managers of their obligatory requirements for protecting technology and information assets.C It needs to have the acceptance and support of all levels of employees within the organization in order for it to be appropriate and effective.D It specifies how hardware and software should be used throughout the organization.,D,48 Which of the following could be defined as the likelihood of a threat agent taking advantage of a vulnerability?A A risk B A countermeasure C An exposure D A residual risk,A,49 Which of the following should be given technical security training?A Senior managers,functional managers and business unit managersB Security practitioners and information systems auditorsC IT support personnel and system administratorsD Operators,C,50 Related to information security,availability is the opposite of which of the following?A distribution B destruction C documentation D delegation,B,51 Which must bear the primary responsibility for determining the level of protection needed for information systems resources?A Seniors security analystsB systems auditorsC Senior ManagementD IS security specialists,C,52 What would best define risk management?A The process of eliminating the riskB The process of reducing risk to an acceptable levelC The process of assessing the risksD The process of transferring risk,B,

    注意事项

    本文(《安全管理习题讲解》PPT课件.ppt)为本站会员(小飞机)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开