67. Which of the following are required to enforce system-specific policies?
1.
Logical access controls2.
Physical security measures3.
Management controls4.
Technical controlsa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 468. Benefits of central computer security programs include which of the following?
1.
Sharing information2.
Installing technical controls3.
Controlling virus infections4.
Administering day-to-day computer securitya.
1 and 2b.
1 and 3c.
2 and 3d.
2 and 469. Which of the following are essential to improving IT security performance through metrics?
1.
Quantifying performance gaps2.
Providing insights into root causes3.
Submitting reports to internal management4.
Collecting meaningful data for analysisa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 470. The concept of least privilege is primarily based on which of the following?
a.
Risk assessmentb.
Information flow enforcementc.
Access enforcementd.
Account management71. Results-based training does
a.
Roles and responsibilitiesb.
Understanding levelsc.
Job titlesd.
Backgrounds72. Which of the following are essential to reach a higher rate of success in protecting information?
1.
Proven security tools and techniques2.
Encouraging professional certification3.
Training employees in security policies4.
Role-based security responsibilitiesa.
1 and 2b.
2 and 3c.
1 and 4d.
3 and 4Proven security tools and techniques and encouraging professional certification indirectly support training employees in security policies and role-based security responsibilities.
73. Which of the following is the ultimate purpose of information security performance metrics?
a.
To pinpoint problemsb.
To scope resources for remediationc.
To track ownership of datad.
To improve information securityIntermediate benefits of performance measurement, leading to the ultimate purpose, include assisting with pinpointing problems, scoping the resources for remediation, tracking the status of remediation, and quantifying successes. Measurement also creates accountability for results by tracking ownership of data and its related activities.