Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
An organization’s board of executives needs to see quarterly measurements on risk reduction. What would be the most excellent metric for this reason?
Correct
The metric on time to fix critical servers will be the foremost meaningful metric for the board of executives. The other measurements, whereas potentially interesting at the operational level, don’t pass on trade meaning to board members.
Incorrect
The metric on time to fix critical servers will be the foremost meaningful metric for the board of executives. The other measurements, whereas potentially interesting at the operational level, don’t pass on trade meaning to board members.
-
Question 2 of 10
2. Question
Which of the taking after measurements is the most excellent illustration of a driving pointer?
Correct
The metric of the rate of basic servers being fixed inside SLAs is the best driving pointer since it may be a harsh indicator of the likelihood of a future security occurrence. The other measurements are trailing pointers since they report on past episodes.
Incorrect
The metric of the rate of basic servers being fixed inside SLAs is the best driving pointer since it may be a harsh indicator of the likelihood of a future security occurrence. The other measurements are trailing pointers since they report on past episodes.
-
Question 3 of 10
3. Question
What are the components of the commerce show for data security (BMIS)?
Correct
The components of BMIS are the organization, individuals, handle, and innovation. The dynamic interconnects (DIs) are culture, overseeing, design, emergence, enabling and back, and human variables.
Incorrect
The components of BMIS are the organization, individuals, handle, and innovation. The dynamic interconnects (DIs) are culture, overseeing, design, emergence, enabling and back, and human variables.
-
Question 4 of 10
4. Question
The most excellent definition of a methodology is:
Correct
A procedure is an arrangement to attain an objective. An objective is the “what” that an organization needs to realize, and a procedure is the “how” the objective will be achieved.
Incorrect
A procedure is an arrangement to attain an objective. An objective is the “what” that an organization needs to realize, and a procedure is the “how” the objective will be achieved.
-
Question 5 of 10
5. Question
As a portion of understanding the organization’s current state, a security strategist is looking at the organization’s security arrangement. What does the arrangement tell the strategist?
Correct
By itself, the security approach tells somebody small almost an organization’s security practices. An organization’s arrangement is as it were a collection of explanations; without examining commerce forms, commerce records, and meeting staff, security proficient cannot create any conclusions around an organization’s security hones.
Incorrect
By itself, the security approach tells somebody small almost an organization’s security practices. An organization’s arrangement is as it were a collection of explanations; without examining commerce forms, commerce records, and meeting staff, security proficient cannot create any conclusions around an organization’s security hones.
-
Question 6 of 10
6. Question
Whereas gathering and analyzing different security-related commerce records, the security supervisor has decided that the organization has no security incident log. What conclusion can the security chief make from this?
Correct
An organization that does not have a security occurrence log likely needs the capability to distinguish and react to an occurrence. It isn’t sensible to accept that the organization has had no security occurrences since minor occurrences happen with regularity. Claiming that the organization has compelling controls is unreasonable, as it is caught on that occurrences happen indeed when successful controls are in place (because not all sorts of episodes can sensibly be avoided).
Incorrect
An organization that does not have a security occurrence log likely needs the capability to distinguish and react to an occurrence. It isn’t sensible to accept that the organization has had no security occurrences since minor occurrences happen with regularity. Claiming that the organization has compelling controls is unreasonable, as it is caught on that occurrences happen indeed when successful controls are in place (because not all sorts of episodes can sensibly be avoided).
-
Question 7 of 10
7. Question
The reason of security administration is to:
Correct
The reason for security administration is to form a implies by which executive management is made mindful of improvements within the organization’s security program and to empower them to control results within the program.
Incorrect
The reason for security administration is to form a implies by which executive management is made mindful of improvements within the organization’s security program and to empower them to control results within the program.
-
Question 8 of 10
8. Question
The reason of quantitative hazard examination is to:
Correct
Quantitative hazard examination is utilized to decide the potential fetched of a breach.
Incorrect
Quantitative hazard examination is utilized to decide the potential fetched of a breach.
-
Question 9 of 10
9. Question
The reason of quantitative hazard examination is to:
Correct
Quantitative hazard examination is utilized to decide the potential fetched of a breach.
Incorrect
Quantitative hazard examination is utilized to decide the potential fetched of a breach.
-
Question 10 of 10
10. Question
The reason for the security approach is:
Correct
Security approach, and each other approach, characterizes worthy and unacceptable behavior.
Incorrect
Security approach, and each other approach, characterizes worthy and unacceptable behavior.