(TCO 1) Defense-in-depth is a _____.
security requirement
security model
security strategy
security policy
security control
Question 2. Question :
(TCO 1) What are the common effects of controls?
Prevention, detection, and response
Administration, technology, and physical
Detection, accounting, and access control
Identification, audit, and access control
Confidentiality, integrity, and availability
Question 3. Question :
(TCO 1) Information security managers should not be motivated by _____.
IN concern for the well-being of society
governmental regulation
fear, uncertainty, and doubt
promotion potential
readiness
:
Question 4. Question :
(TCO 1) The unique security issues and considerations of every system make it crucial to understand all of the following, except _____.
security standards
security skills of developers
hardware and software security configurations
data sensitivity
IN the business of the organization
Question 5. Question :
(TCO 2) Which of the following domains is not part of the IISSCC CBK?
Architecture
Project Management
Ethics
Law
Operations Security
Question 6. Question :
(TCO 2) A security event that causes damage is called _____.
IN a compromise
a violation
an incident
a mishap
a transgression
Question 7. Question :
(TCO 2) What is the enemy of security?
Industry
Foreign nations
Competitors
Complexity
People
Question 8. Question :
(TCO 2) What are the effects of security controls?
Confidentiality, integrity, and availability
Administrative, physical, and operational
Detection, prevention, and response
Management, operational, and technical
None of the above
Question 9. Question :
(TCO 1) Policies and procedures are often referred to as _____.
models
a necessary evil
guidelines
documentation
Question 10. Question :
(TCO 2) There are _____ domains of the Common Body of Knowledge.
12
nine
11
10