74. What should the information security manager do when the residual risk has
a.
Repeat the risk management cycle.b.
Develop new policies and procedures.c.
Implement new security technologies.d.
Establish a specific schedule for assessing risk.75. The level of protection for an IT system is determined by an evaluation of which of the following elements?
1.
Availability2.
Integrity3.
Sensitivity4.
Criticalitya.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 476. Which of the following IT metrics types measure the results of security services delivery?
1.
Implementation metrics2.
Effectiveness metrics3.
Efficiency metrics4.
Impact metricsa.
1 and 2b.
2 and 3c.
1 and 4d.
3 and 477. Which of the following factors affects the trustworthiness of an information system?
1.
Security functionality2.
Security categorization3.
Security certification4.
Security assurancea.
1 and 2b.
1 and 4c.
3 and 4d.
1, 2, 3, and 4Security categorization and security certification are not relevant here because security categorization classifies systems according to security levels, and security certification deals with approving a new system prior to its operation.
78. When engaging information system services from an external service provider, which of the following is needed to mitigate security risk?
a.
Chain-of-custodyb.
Chain-of-commandc.
Chain-of-documentsd.
Chain-of-trustChain-of-custody refers to preserving evidence, and it may include chain-of-documents. Chain-of-command is a management principle, which follows job hierarchy in giving orders to subordinate employees by a supervising employee.
79. From a security viewpoint, which of the following is the most important document prepared by an external information system service provider?
a.
Service provider security roleb.
End user security rolec.
Memorandum of agreementd.
Service-level agreement80. The results of information-security program assessment reviews can be used to do which of the following?
1.
To support the certification and accreditation process2.
To support the continuing monitoring requirement3.
To prepare for audits