Preview

IT255 Practice Exam Questions

Good Essays
Open Document
Open Document
11382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT255 Practice Exam Questions
Practice Questions with Solutions

Chapter 1
1. What is the correct approach for addressing security and organization objectives? a. Security and organization objectives should be developed separately.
b. Security should drive organization objectives.
c. Security should support organization objectives.
d. The site security officer should approve or reject organization objectives. 2. The statement, “Promote professionalism among information system security practitioners through the provisioning of professional certification and training” is an example of a/an:
a. Mission statement
b. Objective
c. Goal
d. Requirement
3. The two components of risk management are:
a. Risk assessment and risk analysis
b. Vulnerability assessment and risk treatment
c. Risk assessment and risk mitigation
d. Risk assessment and risk treatment
4. A security manager needs to perform a risk assessment on a critical business application in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is:
a. Perform a qualitative risk assessment only
b. Perform a quantitative risk assessment only

c. Perform a qualitative risk assessment first, then perform a quantitative risk assessment
d. Perform a quantitative risk assessment, then perform a qualitative risk assessment 5. A qualitative risk assessment is used to identify:
a. Vulnerabilities, threats, and countermeasures
b. Vulnerabilities, threats, threat probabilities, and countermeasures
c. Assets, risks, and mitigation plans
d. Vulnerabilities and countermeasures
6. The impact of a specific threat is defined as:
a. The cost of recovering the asset
b. The cost required to protect the related asset
c. The effect of the threat if it is realized
d. The loss of revenue if it is realized
7. Exposure factor is defined as:
a. The part of an asset's value that is likely to be lost by a particular threat b.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Question 8. While at the district attorney’s office, Paralegal Fritz worked on the prosecution of thousands of cases. Fritz feels trapped in that job. Even though he would like to move into the defense side for a law firm where he could find higher salaries, he’s staying put because he knows that he would raise conflict issues at all of the local firms. As Fritz’s friend, you advise him to stay put at the D.A.’s office because the conflict problem cannot be solved and the benefits are better where he is anyway.…

    • 795 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ait235 Quizes

    • 5726 Words
    • 23 Pages

    The _________ is a term for the device or unit that originates the information transfer.…

    • 5726 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    (167) Command issued to upgrade an old version of the Cisco IOS software by downloading a new image from the TFTP server…

    • 469 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    12. You log onto a network and are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics. This is an example of which of the following?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Level 2 Use the OSI model to explain how an email message from you gets read by the recipient on his/her computer.…

    • 1636 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hrm 531 Week 4 Quiz

    • 292 Words
    • 2 Pages

    Is3110 Quiz 4 Quiz 4 Questions 1. How often should RA be completed? a. Frequently/as needed b. Once a year/as needed c.…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It260 Midterm Study Guide

    • 629 Words
    • 3 Pages

    1 – Two basic types of computers that can be on an enterprise network are:…

    • 629 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NRC 261 Exam 2 Study Guide

    • 1452 Words
    • 6 Pages

    What is a metapopulation and how does it relate to the metaphor of sources and sinks? See box on page 97.…

    • 1452 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Phi227 Exam Review 02

    • 892 Words
    • 4 Pages

    1. In the paternalistic model of doctor-patient relationship, power resident exclusively with Doctors; in the engineering model, it resides entirely with Patients.…

    • 892 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITP 310 Study Guide

    • 638 Words
    • 3 Pages

    Example: Email Programs would need: messages (subject, recipient, sender, time and date, content), contacts, message folders (inbox, outbox, drafts, etc.)…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 260 Final Exam Review

    • 300 Words
    • 2 Pages

    22. Know the diff groups and what they can be used for regarding mailbox operations…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    American international relations are extremely scattered, and when examined can be interpreted in many different ways. This may be because there is perhaps a blend of these major schools of American foreign policy in all of our international relations. The major schools that will be used as lenses are isolationism, liberal internationalism, Kissingerian realism, democratic globalism, and democratic realism. I am going to use these lenses to examine how the liberation in Iraq was handled, and what foreign policy was mainly used.…

    • 2543 Words
    • 11 Pages
    Good Essays
  • Good Essays

    1. Which is more problematic: acknowledging differences in groups or assigning a hierarchy to different groups?…

    • 972 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cips Level-5 Exam Guidance

    • 18688 Words
    • 75 Pages

    The units that make up the award are: • Management in the purchasing function • Risk management and supply chain vulnerability • Improving supply chain performance Plus a choice of two optional units: • • • • • • Marketing for purchasers Storage and distribution Operations management in the supply chain The machinery of government Contracting in the public sector Sustainable procurement Revised content…

    • 18688 Words
    • 75 Pages
    Good Essays
  • Good Essays

    *b. a comparison of the value of assets that will either mature or be repriced within a given time interval with the value of liabilities that will either mature or be repriced during the same time period.…

    • 2437 Words
    • 10 Pages
    Good Essays