2019年安全管理习题讲解课件

上传人:我*** 文档编号:144771850 上传时间:2020-09-14 格式:PPT 页数:53 大小:208.50KB
返回 下载 相关 举报
2019年安全管理习题讲解课件_第1页
第1页 / 共53页
2019年安全管理习题讲解课件_第2页
第2页 / 共53页
2019年安全管理习题讲解课件_第3页
第3页 / 共53页
2019年安全管理习题讲解课件_第4页
第4页 / 共53页
2019年安全管理习题讲解课件_第5页
第5页 / 共53页
点击查看更多>>
资源描述

《2019年安全管理习题讲解课件》由会员分享,可在线阅读,更多相关《2019年安全管理习题讲解课件(53页珍藏版)》请在金锄头文库上搜索。

1、QUIZ,1 Which of the following is not a responsibility of a database administrator? A Maintaining databases B Implementing access rules to databases C Reorganizing databases D Providing access authorization to databases,D,QUIZ,2 According to governmental data classification levels, how would answers

2、to tests and health care information be classified? A Confidential B Sensitive but unclassified C Private D Unclassified,B,QUIZ,3. According to private sector data classification levels, how would salary levels and medical information be classified? A Confidential B Public C Private D Sensitive,C,QU

3、IZ,4 Which of the next are steps of a common development process of creating a security policy, standards and procedures? A design, development, publication, coding, testing B design, evaluation, approval, publication, implementation C initial and evaluation, development, approval, publication, impl

4、ementation, maintenance D feasibility, development, approval, implementation, integration,C,5 What is the main purpose of a security policy? A to transfer the responsibility for the information security to all users of the organization B to provide detailed steps for performing specific actions C to

5、 provide a common framework for all development activities D to provide the management direction and support for information security,D,6 Which of the following department managers would be best suited to oversee the development of an information security policy? A Security administration B Human re

6、sources C Business operations D Information systems,C,7 Which of the following is not a responsibility of an information owner? A Running regular backups and periodically testing the validity of the backup data. B Delegate the responsibility of data protection to data custodians. C Periodically revi

7、ew the classification assignments against business needs. D Determine what level of classification the information requires.,A,8 Which of the following is not a goal of integrity? A Prevention of the modification of information by unauthorized users. B Prevention of the unauthorized or unintentional

8、 modification of information by authorized users. C Prevention of the modification of information by authorized users. D Preservation of the internal and external consistency.,C,9 Why do many organizations require every employee to take a mandatory vacation of a week or more? A To lead to greater pr

9、oductivity through a better quality of life for the employee. B To reduce the opportunity for an employee to commit an improper or illegal act. C To provide proper cross training for another employee. D To allow more employees to have a better understanding of the overall system.,B,10 Which of the f

10、ollowing would best relate to resources being used only for intended purposes? A Availability B Integrity C Reliability D Confidentiality,A,11 Security of computer-based information systems is which of the following? A technical issue B management issue C training issue D operational issue,B,12 Whic

11、h of the following would be the first step in establishing an information security program? A Development and implementation of an information security standards manual. B Development of a security awareness-training program for employees. C Purchase of security access control software. D Adoption o

12、f a corporate information security policy statement.,D,13 Which of the following tasks may be performed by the same person in a well-controlled information processing facility/computer center? A Computer operations and system development B System development and change management C System developmen

13、t and systems maintenance D Security administration and change management,C,14 Computer security should not: A Cover all identified risks. B Be cost-effective. C Be examined in both monetary and non-monetary terms. D Be proportionate to the value of IT systems.,A,15 Which of the following is most co

14、ncerned with personnel security? A Management controls B Human resources controls C Technical controls D Operational controls,D,16 Which of the following is most likely given the responsibility of the maintenance and protection of the data? A Security administrator B User C Data custodian D Data own

15、er,C,17 Who is responsible for providing reports to the senior management on the effectiveness of the security controls? A Information systems security professionals B Data owners C Data custodians D Information systems auditors,D,18 Risk mitigation and risk reduction controls can be of which of the

16、 following types? A preventive, detective, or corrective B Administrative, operational or logical C detective, corrective D preventive, corrective and administrative,A,19 Which of the following would best classify as a management control? A Review of security controls B Documentation C Personnel security D Physical and environmental protection,A,20 What is the goal of the Maintenance phase in a common development process of a security policy? A to present document to approving body B to writ

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 办公文档 > PPT模板库 > PPT素材/模板

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号