Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIST 1602 Final Exam: 50 Questions with Answers, Exams of Information Security and Markup Languages

A comprehensive set of 50 multiple-choice questions and answers covering various aspects of information security. It is designed to help students prepare for their final exam in cist 1602, a course that likely focuses on cybersecurity principles and practices. The questions cover topics such as risk management, access control, incident response, vulnerability assessment, and information security governance. This resource can be valuable for students seeking to reinforce their understanding of key concepts and test their knowledge before the exam.

Typology: Exams

2024/2025

Available from 12/07/2024

Martin-Ray-1
Martin-Ray-1 🇺🇸

5

(8)

6K documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CIST 1602 50 Questions with
Answers Final Exam 2024/2025 Entry.
1. In large organizations, the InfoSec department is often located
within a(n) _________ division headed by the _________, who
reports directly to the _________. - Answer:::✔✔IT, CISO, CIO
2. Medium-sized organizations tend to spend approximately
__________ percent of the total IT budget on security. -
Answer:::✔✔11%
3. An (ISC)2 program geared toward individuals who want to take
any of its certification exams before obtaining the requisite
experience for certification is the __________. -
Answer:::✔✔Associate of (ISC)2
4. A specialized security administrator responsible for performing
systems development life cycle (SDLC) activities in the
development of a security system is known as __________. -
Answer:::✔✔Security Analyst
5. In the area of risk management, process communications is the
necessary information flow within and between all of the
following EXCEPT: - Answer:::✔✔Just remember that process
communications is between the governance group, RM
framework team, and RM process team during implementation.
pf3
pf4
pf5
pf8

Partial preview of the text

Download CIST 1602 Final Exam: 50 Questions with Answers and more Exams Information Security and Markup Languages in PDF only on Docsity!

CIST 1602 50 Questions with

Answers Final Exam 2024/2025 Entry.

  1. In large organizations, the InfoSec department is often located within a(n) _________ division headed by the _________, who reports directly to the _________. - Answer:::✔✔IT, CISO, CIO
  2. Medium-sized organizations tend to spend approximately __________ percent of the total IT budget on security. - Answer:::✔✔11%
  3. An (ISC)2 program geared toward individuals who want to take any of its certification exams before obtaining the requisite experience for certification is the __________. - Answer:::✔✔Associate of (ISC)
  4. A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system is known as __________. - Answer:::✔✔Security Analyst
  5. In the area of risk management, process communications is the necessary information flow within and between all of the following EXCEPT: - Answer:::✔✔Just remember that process communications is between the governance group, RM framework team, and RM process team during implementation.
  1. An estimate made by the manager using good judgment and experience can account for which factor of risk assessment? - Answer:::✔✔Risk Identification
  2. An understanding of the potential consequences of a successful attack on an information asset by a threat is known as __________. - Answer:::✔✔Impact
  3. T/F Likelihood is the overall rating of the probability that a specific vulnerability will be exploited or attacked. - Answer:::✔✔True
  4. For an organization to manage its InfoSec risk properly, managers should understand how information is __________. - Answer:::✔✔Collected, Processed, Stored, and Transmitted
  5. Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization, is known as __________. - Answer:::✔✔Cost-Benefit Analysis
  6. Because even the implementation of new technologies does not necessarily guarantee an organization can gain or maintain a competitive lead, the concept of __________ has emerged as
  1. A useful tool for resolving the issue of what business function is the most critical, based on criteria selected by the organization, is the __________. - Answer:::✔✔Weighted Table Analysis
  2. After an incident, but before returning to its normal duties, the CSIRT must do which of the following? - Answer:::✔✔Conduct an After-Action Review
  3. T/F A hot site is a fully configured computing facility that includes all services, communications links, and physical plant operations. - Answer:::✔✔True
  4. In the event of an incident or disaster, which planning element is used to guide off-site operations? - Answer:::✔✔Business Continuity
  5. T/F An affidavit is used as permission to search for evidentiary material at a specified location and/or to seize items to return to an investigator's lab for examination after being signed by an approving authority. __________ - Answer:::✔✔True
  6. A process called __________ examines the traffic that flows through a system and its associated devices to identify the most frequently used devices. - Answer:::✔✔Traffic Analysis
  1. A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection. - Answer:::✔✔Scanning
  2. T/F An effective information security governance program requires no ongoing review once it is well established. - Answer:::✔✔False
  3. A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle. - Answer:::✔✔Configuration
  4. A __________ is the recorded condition of a particular revision of a software or hardware configuration item. - Answer:::✔✔Version
  5. Common vulnerability assessment processes include: - Answer:::✔✔Internet VA, Intranet VA, and Modem VA
  6. T/F The Internet of Things refers only to automated sensors.
    • Answer:::✔✔False
  1. A technique used to compromise a system is known as a(n) - Answer:::✔✔Exploit
  2. T/F Deterrence is the best method for preventing an illegal or unethical activity. - Answer:::✔✔TRUE
  3. A process focused on the identification and location of potential evidence related to a specific legal action after it was collected through digital forensics is known as - Answer:::✔✔E- Discovery
  4. Another key U.S. federal agency is _________, which is responsible for coordinating, directing, and performing highly specialized activities to protect U.S. information systems and produce foreign intelligence information. - Answer:::✔✔NSA
  5. The individual responsible for the assessment, management, and implementation of information-protection activities in the organization is known as a(n) - Answer:::✔✔CISO
  6. A qualified individual who is tasked with configuring security technologies and operating other technical control systems is known as a(n) - Answer:::✔✔Security Technician
  1. A high-level executive such as a CIO or VP-IT, who will provide political support and influence for a specific project, is known as a(n) - Answer:::✔✔Champion
  2. According to NIST SP 800-18, Rev. 1, which individual is responsible for the creation, revision, distribution, and storage of the policy? - Answer:::✔✔Policy Administrator
  3. T/F Non-mandatory recommendations that the employee may use as a reference in complying with a policy are known as regulations - Answer:::✔✔False
  4. T/F Information security policies are designed to provide structure in the workplace and explain the will of the organization's management. - Answer:::✔✔False