Midterm Exams Attempt Review
Midterm Exams Attempt Review
Question 1
Correct
Of what value is a business impact analysis (BIA) for a security leader in an organization?
The correct answer is: It provides a view of the criticality of business processes in an organization.
Question 2
Correct
What is the main advantage of a security architecture function in a larger, distributed organization?
The correct answer is: Greater consistency in the use of tools and configurations
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 1/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 3
Correct
Which of the following is the most effective means for making information security policies, standards, and
guidelines available to an organization’s workforce?
a. Publish policies, standards, and guidelines on an intranet site where they can be easily found.
b. Publish policies, standards, and guidelines in hard copy and have copies available at the security office.
c. Policies, standards, and guidelines should be on a “need to know” basis and not published or sent to
personnel.
d. E-mail policies, standards, and guidelines to the workforce once per year.
The correct answer is: Publish policies, standards, and guidelines on an intranet site where they can be easily
found.
Question 4
Correct
Resolves shortcomings
Compensating
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 2/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 5
Correct
The ultimate responsibility for an organization’s information security program lies with whom?
Question 6
Correct
The correct answer is: To measure the performance and effectiveness of security controls
Question 7
Correct
What kind of statement is the following: “Passwords are to consist of upper- and lowercase letters, numbers, and
symbols, and are to be at least 12 characters in length.”
a. Guideline
b. Standard
c. Procedure
d. Policy
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 3/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 8
Correct
Jerome is seeking a control objective framework that is widely accepted around the world and focuses specifically
on information security controls. Which one of the following frameworks would best meet his needs?
a. ITIL
b. CMM
c. PMBOK Guide
d. ISO 27002
Question 9
Correct
These are sets of rules that define acceptable
behavior within a Issue-specific security policies (ISSPs)
specific technology, such as e-mail or Internet usage.
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 4/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 10
Correct
Ryan is designing the long-term security plan for his organization and has a three- to five-year planning horizon.
What type of plan is he developing?
a. Summary
b. Operational
c. Strategic
d. Tactical
Question 11
Correct
What is the best approach to the development of an organization’s security incident response plan?
The correct answer is: Leveraging the organization’s crisis management plan
Question 12
Correct
a. A security process and controls framework that can be integrated with ITIL or ISO 20000
b. An IT controls and process framework on which IT controls and processes can be added at an
organization’s discretion
c. An IT process framework with optional security processes when Extended COBIT is implemented
d. An IT process framework that includes security processes that are interspersed throughout the
framework
The correct answer is: An IT process framework that includes security processes that are interspersed throughout
the framework
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 5/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 13
Correct
Danmar discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information
security principle is the keylogger most likely designed to disrupt?
a. Confidentiality
b. Integrity
c. Availability
d. Denial
Question 14
Correct
Which of the following is most important for a successful information security program?
Question 15
Correct
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 6/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 16
Correct
Which is the best party to make decisions about the purpose and function of business applications?
Question 17
Correct
You are completing your business continuity planning effort and have decided that you wish to accept one of the
risks. What should you do next?
Question 18
Correct
Which one of the following tools is most often used for identification purposes and is not suitable for use as an
authenticator?
a. Password
b. Token
c. Username
d. Retinal scan
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 7/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 19
Correct
Security efforts that seek to provide a superior level of performance in the protection of information are a
demonstration of due diligence.
Select one:
True
False
Question 20
Correct
Question 21
Correct
Timothy has located his organization’s mission statement and a list of strategic objectives. What steps should
Timothy take to ensure that the information security program aligns with the business?
a. Develop a list of activities that will support the organization’s strategic objectives, and determine the cost
of each
b. Select those controls from the organization’s control framework that align to each objective, and then
ensure that those controls are effective
c. Discuss strategic objectives with business leaders to understand better what they want to accomplish
and what steps are being taken to achieve them
d. Select the policies from the organization’s information security policy that are relevant to each objective,
and ensure that those policies are current.
The correct answer is: Discuss strategic objectives with business leaders to understand better what they want to
accomplish and what steps are being taken to achieve them
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 8/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 22
Correct
A security leader has been asked to justify the need to implement a new strategy for information security. How
should the security leader respond?
a. Develop a project plan showing the personnel, tasks, timelines, and dependencies.
b. Develop a business case that includes success criteria, requirements, costs, and action plan.
c. Develop a SWOT diagram showing strengths, weaknesses, opportunities, and threats.
d. Develop a risk matrix that includes the potential consequences if the strategy is not implemented.
The correct answer is: Develop a business case that includes success criteria, requirements, costs, and action
plan.
Question 23
Correct
An organization has decided to improve its information security program by developing a full suite of policies,
procedures, standards, and processes. Which of these must be developed first?
a. Standards
b. Processes
c. Procedures
d. Policies
Question 24
Correct
a. Approval of spending
b. Approval for new hires
c. Visible support to reinforce the importance of the strategy
d. Improved enforcement of policy
The correct answer is: Visible support to reinforce the importance of the strategy
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 9/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 25
Correct
Question 26
Correct
Controls that deal with the operational functions of security that have been integrated into Operational
the repeatable
processes of the organization.
Controls that cover security processes that are designed by strategic planners, integrated
into the organization’s
management practices, and routinely used by security administrators Management
Controls that cover security processes that are designed by strategic planners, integrated into the organization’s
management practices, and routinely used by security administrators to design, implement, and monitor other
control systems. → Management,
Controls that support the tactical portion of a security program and that have been implemented as reactive
mechanisms to deal
with the immediate needs of the organization as it responds to the realities of the technical
environment. → Technical
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 10/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 27
Correct
The correct answer is: Guidelines are optional and not required.
Question 28
Correct
a. ISO 27001 consists primarily of a framework of security controls, followed by an appendix of security
requirements for running a security management program.
b. ISO 27001 consists primarily of a body of requirements for running a security management program,
along with an appendix of security controls.
c. ISO 27001 consists of a framework of information security controls.
d. ISO 27001 consists of a framework of requirements for running a security management program.
The correct answer is: ISO 27001 consists primarily of a body of requirements for running a security management
program, along with an appendix of security controls.
Question 29
Correct
Which of the following is the most likely result of an organization that lacks a security architecture function?
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 11/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 30
Correct
Bernadette is working with the management team in her company to classify data in an attempt to apply extra
security controls that will limit the likelihood of a data breach. What principle of information security is Bernadette
trying to enforce?
a. Availability
b. Confidentiality
c. Denial
d. Integrity
Question 31
Correct
The correct answer is: Management intent and direction for security activities
Question 32
Correct
The biggest barrier to benchmarking in InfoSec is the fact that many organizations do not share results with other
organizations.
Select one:
True
False
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 12/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 33
Correct
Hani, a CISO, has vulnerability management metrics and needs to build business-level metrics. Which of the
following is the best leading indicator metric suitable for his organization’s board of directors?
The correct answer is: Average time to patch servers supporting manufacturing processes
Question 34
Correct
The correct answer is: Helps personnel develop better judgment when handling company information
Question 35
Correct
Which one of the following control categories does not accurately describe a fence around a facility?
a. Preventive
b. Deterrent
c. Detective
d. Physical
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 13/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 36
Correct
What is the best method for determining whether employees understand an organization’s information security
policy?
The correct answer is: Incorporate quizzes into security awareness training.
Question 37
Correct
The correct answer is: That they are unambiguous and meet the standards
Question 38
Correct
Victor, a CISO who manages a large security group, wants to create a mission statement for the CISO group. What
is the best approach for creating this mission statement?
The correct answer is: Start with the organization’s mission statement
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 14/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 39
Correct
The characteristic of information whereby only those with sufficient privileges and a Confidentiality
demonstrated need may access it.
Occurs when a control provides assurance that every activity undertaken can be attributed Accountability
to a named person or
automated process.
Occurs when a control provides assurance that every activity undertaken can be attributed to a named person or
automated process. → Accountability,
Question 40
Correct
What is the most effective way of ensuring that personnel are aware of an organization’s security policies?
The correct answer is: Require personnel to acknowledge compliance to security policies in writing annually.
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 15/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 41
Correct
Limits a user’s access to the specific information required to perform the currently
assigned task, and not
merely to the category of data required for a general work Need-to-know
function.
Requires that significant tasks be split up in such a way that more than one individual is Separation of duties
responsible for
their completion.
Members of the organization can access the minimum amount of information for the Least privilege
minimum
amount of time necessary to perform their required duties.
Requires that significant tasks be split up in such a way that more than one individual is responsible for
their
completion. → Separation of duties,
Members of the organization can access the minimum amount of information for the minimum
amount of time
necessary to perform their required duties. → Least privilege
Question 42
Correct
Lilly is the security administrator for a public school district. She is implementing a new student information system
and is testing the code to ensure that students are not able to alter their own grades. What principle of information
security is Lilly enforcing?
a. Confidentiality
b. Availability
c. Integrity
d. Denial
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 16/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 43
Correct
What is the best method for ensuring that an organization’s security program achieves adequate business
alignment?
The correct answer is: Understand the organization’s vision, mission statement, and objectives
Question 44
Correct
The statement, “Passwords can be constructed from words, phrases, numbers, and special characters in a variety
of ways that are easily remembered but not easily guessed,” is an example of what?
a. A procedure
b. A guideline
c. A policy
d. A standard
Question 45
Correct
Iris is writing a document that will provide configuration information regarding the minimum level of security that
every system in the organization must meet. What type of document is she preparing?
a. Guideline
b. Baseline
c. Procedure
d. Policy
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 17/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Question 46
Correct
Question 47
Correct
A new CISO in an organization is building its information security program from the ground up. To ensure
collaboration among business leaders and department heads in the organization, the CISO should form and
manage which of the following?
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 18/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 19/20
3/22/22, 1:42 PM Midterm Exams: Attempt review
Previous activity
◄ Module 3: SECURITY PROGRAMS, MODELS, AND PRACTICES
Jump to...
Next activity
Module 1: INFORMATION SECURITY MANAGEMENT AND PLANNING (3BSAIS3/3BSAIS4) ►
Stay in touch
New Era University
https://neu.edu.ph
+632-8-981-4224
https://collvle.neu.edu.ph/mod/quiz/review.php?attempt=587037&cmid=186002 20/20