Filters
Question type

Study Flashcards

The primary goal of the ____________________ monitoring domain is an informed awareness of the state of all the organization's networks, information systems, and information security defenses.

Correct Answer

verifed

verified

The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all the organization's networks, information systems, and information security defenses. _________________________

A) True
B) False

Correct Answer

verifed

verified

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.


A)  ASP
B)  ISP 
C)  SVP
D)  PSV

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

WLAN stands for "wide local area network." _________________________

A) True
B) False

Correct Answer

verifed

verified

An effective information security governance program requires no ongoing review once it is well established.

A) True
B) False

Correct Answer

verifed

verified

Remediation of vulnerabilities can be accomplished by accepting or transferring the risk, removing the threat, or repairing the vulnerability.

A) True
B) False

Correct Answer

verifed

verified

The optimum approach for escalation is based on a thorough integration of the monitoring process into the __________.


A)  IDE
B)  CERT 
C)  ERP
D)  IRP

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Almost all aspects of a company's environment are ____________________, meaning threats that were originally assessed in the early stages of the project's systems development life cycle have probably changed and new priorities have emerged.

Correct Answer

verifed

verified

The ____________________ tester's ultimate responsibility is to identify weaknesses in the security of the organization's systems and networks and then present findings to the system owners in a detailed report.

Correct Answer

verifed

verified

Rehearsals that use plans as realistically as possible are called ____________________ games.

Correct Answer

verifed

verified

For configuration management (CM) and control, it is important to document the proposed or actual changes in the system security plan. _________________________

A) True
B) False

Correct Answer

verifed

verified

As the help desk personnel screen problems, they must also track the activities involved in resolving each complaint in a help desk ____________________ system.

Correct Answer

verifed

verified

A(n) ____________________ analysis is a procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segment (the baseline of systems and services).

Correct Answer

verifed

verified

The basic function of the external monitoring process is to monitor activity, report results, and escalate warnings. _________________________

A) True
B) False

Correct Answer

verifed

verified

Detailed __________ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.


A)  escalation
B)  intelligence 
C)  monitoring
D)  elimination

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.

A) True
B) False

Correct Answer

verifed

verified

Common vulnerability assessment processes include: 


A)  Internet VA
B)  wireless VA 
C)  intranet VA
D)  All of these

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Documenting information system changes and assessing their potential impact on system security is an important and consequential part of digital forensics.

A) True
B) False

Correct Answer

verifed

verified

Over time, external monitoring processes should capture information about the external environment in a format that can be referenced across the organization as threats emerge and for historical use.

A) True
B) False

Correct Answer

verifed

verified

Threats cannot be removed without requiring a repair of the vulnerability.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 116

Related Exams

Show Answer