Bharadwaj-Quiz 1-Info Governance

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

QUESTION 1

1. Although it is impossible to eliminate all business risks, a good policy can reduce the likelihood
of risk occurring or reduce its impact. A business must find a way to balance a number of
competing drivers. Which of the following is notone of these drivers?

A. cost

B. customer satisfaction

C. compliance

D. regulation

10 points
QUESTION 2
1. _______________ is a measurement that quantifies how much information can be transmitted
over the network.

Memory

A.

B. DMZ
C. Cloud storage
D. Bandwidth

10 points
QUESTION 3
1. _____________________ in e-commerce broadly deals with creating rules on how to handle a
consumer’s transaction and other information.

A. Security controls

B. Consumer Rights

C. Personal Privacy

D. Shareholder Rights

10 points
QUESTION 4
1. _______________ refers to an attempt to cause fear or major disruptions in a society through
hacking computers. Such attacks target government computers, major companies, or key areas
of the economy.
A. cyberterrorism

B. globalization

C. nation state attack

D. sovereign war

10 points
QUESTION 5
1. The privacy policy emerged as a type of code of conduct. With the rise of social media, many
businesses are concerned about employees posting information about the company on social
media sites. What would be forbidden personal privacy data?

A. Name and Address

B. Social Security

C. Health information

D. All of the above

10 points
QUESTION 6
1. In 1999, the ___________________ is a law that came into being to repeal existing laws so that
banks, investment companies, and other financial services companies could merge.

The Health Insurance Portability and Accountability Act (HIPAA)

The Federal Information Security Management Act (FISMA)


The Gramm-Leach-Bliley Act (GLBA)
The Sarbanes-Oxley (SOX) Act

10 points
QUESTION 7
1. What are the primary differences between a remote access domain and a user domain is that in
a user domain?

A. moving from a public unsecure network into the private secure company network.
B. special remote authenication

C. networking connectivity from different locations

D. All of the above

10 points
QUESTION 8
1. Although it is impossible to eliminate all business risks, a good policy can reduce the likelihood
of risk occurring or reduce its impact. A business must find a way to balance a number of
competing drivers. Which of the following is notone of these drivers?

cost

regulation

customer satisfaction

compliance

10 points
QUESTION 9
1. A typical data leakage protection program provides several layers of defense to prevent
confidential data from leaving the organization. Which of the following is not one of the layers
of defense?

inventory
A.

B. perimeter
C. device management
self-regulation
D.

10 points
QUESTION 10
1. __________is a set of processes that are used to ensure significant changes are implemented to
help individuals overcome resistance to change, help them see value or reason for the change,
and accept the change.

Self-Interest

A.

B. Organization

Change Management
C.
D. Counseling

10 points
QUESTION 11
1. A(n) ___________________ is a confirmed event that compromises the confidentiality,
integrity, or availability of information.

A. breach

B. residual risk

C. operational deviation

D. threat

10 points
QUESTION 12
1. Select the appropriate answer.
A. Align,Plan and Organize

B. Build, Acquire and Implement

C. Deliver, Service and Support

D. Evaluate, Assess and Perform

10 points
QUESTION 13
1. The phrase “tone at the top” refers to the ways that a company’s leaders express their
____________________to security policies and make sure every employee knows the
____________________.

A. commitment, profitability

B. commitment, priorities

C. ownership, way it impacts sales

D. apprehension, concerns

10 points
QUESTION 14
1. While ____________ are chiefly concerned with maximizing profit and maintaining a healthy
stock price as a business concern, the government focuses more on fairness, health, and safety
issues.

auditors

shareholders
local politicians

project managers

10 points
QUESTION 15
1. Identify traits of a leader that can impact policy adoption:

A. Values

B. Goals/Vision

C. Training

D. Culture

E. All of the Above

10 points
QUESTION 16
1. Select the appropriate answer below.
A. Information Systems and Audit Control Association (ISACA)

B. Control Objectives for Information and Related Technology (COBIT)

C. Business As Usual (BAU)

D. Business Processing Re-engineering (BPR)

10 points
QUESTION 17
1. In general, it is good practice to make your security policies relevant to____________ because
they stand a better chance of being followed.

A. customer satisfaction

B. business needs

C. hr practices

D. stardards

10 points
QUESTION 18
1. An organization’s _________________ is a good source for determining what should be in
security policies to meet regulatory requirements.

chief information officer (CIO)


A.
B. privacy officer
C. chief information security officer (CISO)
D. human resources manager
10 points
QUESTION 19
1. Select the correct response.
A. Vulnerability, Risk

B. Risk, Vulnerability

C. Threat, risk

D. Risk, Threat

10 points
QUESTION 20
1. The process of restricting users’ access so that they access an application rather than the
data itself is often referred to as ____________.

A. Entitlement

B. restrictions

C. regulatory

D. standard

10 points

Click Save and Submit to save and submit. Click Save All Answers to save all answers.
User Bharadwaj Talari
Course Fall 2019 - Operations Security (ISOL-631-30) (ISOL-631-31) - Combined - Full Term
Test Quiz 1: Chapers 1,2,3 & 4 Content Understanding
Started 9/17/19 5:09 AMLATE
Submitted 9/17/19 5:44 AMLATE
Due Date 9/16/19 11:59 PM
Status Needs Grading
Attempt Score 0 out of 200 points
Time Elapsed 34 minutes out of 1 hour
Instructions Choose the appropriate answers by selecting multiple choice, true or false or fill in the blank for
each question.

Results Feedback
Displayed
 Question 1
10 out of 10 points
Although it is impossible to eliminate all business risks, a good policy can reduce the
likelihood of risk occurring or reduce its impact. A business must find a way to balance a
number of competing drivers. Which of the following is not one of these drivers?

 Question 2
10 out of 10 points
_______________ is a measurement that quantifies how much information can be
transmitted over the network.

 Question 3
10 out of 10 points
_____________________ in e-commerce broadly deals with creating rules on how to handle
a consumer’s transaction and other information.

 Question 4
10 out of 10 points
_______________ refers to an attempt to cause fear or major disruptions in a society
through hacking computers. Such attacks target government computers, major companies,
or key areas of the economy.

 Question 5
10 out of 10 points
The privacy policy emerged as a type of code of conduct. With the rise of social media, many
businesses are concerned about employees posting information about the company on
social media sites. What would be forbidden personal privacy data?
 Question 6
10 out of 10 points
In 1999, the ___________________ is a law that came into being to repeal existing laws so
that banks, investment companies, and other financial services companies could merge.

 Question 7
0 out of 10 points
What are the primary differences between a remote access domain and a user domain is
that in a user domain?

 Question 8
10 out of 10 points
Although it is impossible to eliminate all business risks, a good policy can reduce the
likelihood of risk occurring or reduce its impact. A business must find a way to balance a
number of competing drivers. Which of the following is not one of these drivers?

 Question 9
10 out of 10 points
A typical data leakage protection program provides several layers of defense to prevent
confidential data from leaving the organization. Which of the following is not one of the
layers of defense?

 Question 10
10 out of 10 points
__________is a set of processes that are used to ensure significant changes are implemented
to help individuals overcome resistance to change, help them see value or reason for the
change, and accept the change.

 Question 11
10 out of 10 points
A(n) ___________________ is a confirmed event that compromises the confidentiality,
integrity, or availability of information.

 Question 12
0 out of 10 points
Select the appropriate answer.
 Question 13
10 out of 10 points
The phrase “tone at the top” refers to the ways that a company’s leaders express their
____________________to security policies and make sure every employee knows the
____________________.

 Question 14
10 out of 10 points
While ____________ are chiefly concerned with maximizing profit and maintaining a healthy
stock price as a business concern, the government focuses more on fairness, health, and
safety issues.

 Question 15
10 out of 10 points
Identify traits of a leader that can impact policy adoption:

 Question 16
0 out of 10 points
Select the appropriate answer below.

 Question 17
0 out of 10 points
In general, it is good practice to make your security policies relevant to____________
because they stand a better chance of being followed.

 Question 18
10 out of 10 points
An organization’s _________________ is a good source for determining what should be in
security policies to meet regulatory requirements.

 Question 19
0 out of 10 points
Select the correct response.

 Question 20
10 out of 10 points
The process of restricting users’ access so that they access an application rather than the
data itself is often referred to as ____________.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy