Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the taking after is the extreme objective of IT controls?
Correct
Whereas IT security controls do diminish IT chance, the extreme goal is to diminish the in general hazard to the trade.
Incorrect
Whereas IT security controls do diminish IT chance, the extreme goal is to diminish the in general hazard to the trade.
-
Question 2 of 10
2. Question
Which of the taking after best portrays the reason to make a business case for IT control usage?
Correct
A trade case is utilized to legitimize the assets used to implement a control, adjusting taken a toll with the chance brought about on the off chance that the control isn’t actualized.
Incorrect
A trade case is utilized to legitimize the assets used to implement a control, adjusting taken a toll with the chance brought about on the off chance that the control isn’t actualized.
-
Question 3 of 10
3. Question
All of the taking after are substantial supporting components in building a business case to legitimize executing an IT control, except which one?
Correct
Profitability isn’t a substantial supporting figure in building a trade case to back executing an IT control.
Incorrect
Profitability isn’t a substantial supporting figure in building a trade case to back executing an IT control.
-
Question 4 of 10
4. Question
Which sort of commerce capacities are concerned with information flows and framework interfacing between inside and outside networks and organizations?
Correct
Cross-boundary capacities are those concerned with data flows and framework interfacing between inside and external networks and organizations.
Incorrect
Cross-boundary capacities are those concerned with data flows and framework interfacing between inside and external networks and organizations.
-
Question 5 of 10
5. Question
How can ISSE forms help the control plan and implementation prepare?
Correct
ISSE contributes to the control plan and implementation of the process by guaranteeing that security is considered all through the entire SDLC preparation.
Incorrect
ISSE contributes to the control plan and implementation of the process by guaranteeing that security is considered all through the entire SDLC preparation.
-
Question 6 of 10
6. Question
Which plan rule relates to how well a control performs its intended work in ensuring a resource?
Correct
Control viability alludes to how well a control performs its intended work in ensuring a resource.
Incorrect
Control viability alludes to how well a control performs its intended work in ensuring a resource.
-
Question 7 of 10
7. Question
Which of the taking after plan standards is concerned with how well, a control works inside its environment, in terms of cost, interoperability, ease of utilize, and so on?
Correct
The planning rule of effectiveness is concerned with how well a control works inside its environment, in terms of cost, interoperability, and complexity, among other variables.
Incorrect
The planning rule of effectiveness is concerned with how well a control works inside its environment, in terms of cost, interoperability, and complexity, among other variables.
-
Question 8 of 10
8. Question
Which of the taking after scenarios best portrays a control hole?
Correct
Authorizations on a touchy organize share that permit all users to examined the substance would be considered ineffectual in protecting touchy data, in this way appearing a control hole; all the other cases are of compelling controls or, indeed in some cases, controls which will be designed as well safely.
Incorrect
Authorizations on a touchy organize share that permit all users to examined the substance would be considered ineffectual in protecting touchy data, in this way appearing a control hole; all the other cases are of compelling controls or, indeed in some cases, controls which will be designed as well safely.
-
Question 9 of 10
9. Question
When considering control and chance possession, which of the following is the most concern?
Correct
Responsibility is the most concern when considering control and hazard proprietorship.
Incorrect
Responsibility is the most concern when considering control and hazard proprietorship.
-
Question 10 of 10
10. Question
Which of the taking after best depicts how security categorization for information is calculated?
Correct
Security categorization for an information framework is calculated as follows: SC information system = {(confidentiality, affect), (integrity, impact), (availability, impact)}
Incorrect
Security categorization for an information framework is calculated as follows: SC information system = {(confidentiality, affect), (integrity, impact), (availability, impact)}