《安全管理习题讲解》PPT课件.ppt
《《安全管理习题讲解》PPT课件.ppt》由会员分享,可在线阅读,更多相关《《安全管理习题讲解》PPT课件.ppt(53页珍藏版)》请在三一办公上搜索。
1、QUIZ,1 Which of the following is not a responsibility of a database administrator?A Maintaining databasesB Implementing access rules to databasesC Reorganizing databasesD Providing access authorization to databases,D,QUIZ,2 According to governmental data classification levels,how would answers to te
2、sts and health care information be classified?A ConfidentialB Sensitive but unclassifiedC Private D Unclassified,B,QUIZ,3.According to private sector data classification levels,how would salary levels and medical information be classified?A Confidential B Public C Private D Sensitive,C,QUIZ,4 Which
3、of the next are steps of a common development process of creating a security policy,standards and procedures?A design,development,publication,coding,testing B design,evaluation,approval,publication,implementation C initial and evaluation,development,approval,publication,implementation,maintenance D
4、feasibility,development,approval,implementation,integration,C,5 What is the main purpose of a security policy?A to transfer the responsibility for the information security to all users of the organizationB to provide detailed steps for performing specific actionsC to provide a common framework for a
5、ll development activitiesD to provide the management direction and support for information security,D,6 Which of the following department managers would be best suited to oversee the development of an information security policy?A Security administrationB Human resourcesC Business operationsD Inform
6、ation systems,C,7 Which of the following is not a responsibility of an information owner?A Running regular backups and periodically testing the validity of the backup data.B Delegate the responsibility of data protection to data custodians.C Periodically review the classification assignments against
7、 business needs.D Determine what level of classification the information requires.,A,8 Which of the following is not a goal of integrity?A Prevention of the modification of information by unauthorized users.B Prevention of the unauthorized or unintentional modification of information by authorized u
8、sers.C Prevention of the modification of information by authorized users.D Preservation of the internal and external consistency.,C,9 Why do many organizations require every employee to take a mandatory vacation of a week or more?A To lead to greater productivity through a better quality of life for
9、 the employee.B To reduce the opportunity for an employee to commit an improper or illegal act.C To provide proper cross training for another employee.D To allow more employees to have a better understanding of the overall system.,B,10 Which of the following would best relate to resources being used
10、 only for intended purposes?A AvailabilityB IntegrityC ReliabilityD Confidentiality,A,11 Security of computer-based information systems is which of the following?A technical issue B management issue C training issue D operational issue,B,12 Which of the following would be the first step in establish
11、ing an information security program?A Development and implementation of an information security standards manual.B Development of a security awareness-training program for employees.C Purchase of security access control software.D Adoption of a corporate information security policy statement.,D,13 W
12、hich of the following tasks may be performed by the same person in a well-controlled information processing facility/computer center?A Computer operations and system development B System development and change management C System development and systems maintenance D Security administration and chan
13、ge management,C,14 Computer security should not:A Cover all identified risks.B Be cost-effective.C Be examined in both monetary and non-monetary terms.D Be proportionate to the value of IT systems.,A,15 Which of the following is most concerned with personnel security?A Management controls B Human re
14、sources controls C Technical controls D Operational controls,D,16 Which of the following is most likely given the responsibility of the maintenance and protection of the data?A Security administrator B User C Data custodian D Data owner,C,17 Who is responsible for providing reports to the senior man
15、agement on the effectiveness of the security controls?A Information systems security professionals B Data owners C Data custodians D Information systems auditors,D,18 Risk mitigation and risk reduction controls can be of which of the following types?A preventive,detective,or correctiveB Administrati
16、ve,operational or logicalC detective,correctiveD preventive,corrective and administrative,A,19 Which of the following would best classify as a management control?A Review of security controls B Documentation C Personnel security D Physical and environmental protection,A,20 What is the goal of the Ma
17、intenance phase in a common development process of a security policy?A to present document to approving body B to write proposal to management that states the objectives of the policy C publication within the organization D to review of the document on the specified review date,D,21 Which approach t
18、o a security program makes sure that the people actually responsible for protecting the companys assets are driving the program?A The top-down approach B The bottom-up approach C The technology approach D The Delphi approach,A,22 The preliminary steps to security planning include all of the followin
19、g EXCEPT which of the following?A Determine alternate courses of action B Establish a security audit function.C Establish objectives.D List planning assumptions.,B,23IT security measures should:A Be tailored to meet organizational security goals.B Make sure that every asset of the organization is we
20、ll protected.C Not be developed in a layered fashion.D Be complex,A,24 Which of the following embodies all the detailed actions that personnel are required to follow?A Baselines B Procedures C Guidelines D Standards,B,25 Which of the following should NOT be addressed by employee termination practice
21、s?A Deletion of assigned logon-ID and passwords to prohibit system access.B Return of access badges.C Employee bonding to protect against losses due to theft.D Removal of the employee from active payroll files.,C,26 Preservation of confidentiality information systems requires that the information is
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 安全管理习题讲解 安全管理 习题 讲解 PPT 课件
链接地址:https://www.31ppt.com/p-5493064.html