91. Trustworthy information systems are defined as:
1.
Operating within defined levels of risk2.
Handling environmental disruptions3.
Handling human errors4.
Handling purposeful attacksa.
1 onlyb.
3 onlyc.
4 onlyd.
1, 2, 3, and 492. Which of the following combinations of conditions can put the IT assets at the most risk of loss?
a.
System interconnectivity and poor security managementb.
System interconnectivity and poor controls over data sensitivityc.
System interconnectivity and lack of system backupsd.
System interconnectivity and inadequate physical security93. An IT security training program is a part of which of the following control categories?
a.
Application controlsb.
General controlsc.
Administrative controlsd.
Technical controls94. What is the last step when an insider violates a security policy?
a.
Verbal warningb.
Dismissalc.
Legal actiond.
Written warning95. Which of the following is referred to when data is transferred from high network users to low network users?
a.
Data downgradeb.
Data regradec.
Data upgraded.
Data releaseData downgrade is the change of a classification label to a lower label without the changing the contents of the data. Data upgrade is the change of a classification label to a higher label without the changing the contents of the data. Data release is the process of returning all unused disk space to the system when a dataset is closed at the end of processing.
96. Which of the following must be done first to protect computer systems?
a.
Battling information abusersb.
Fighting hackersc.
Reducing vulnerabilitiesd.
Catching crackers97. Which of the following are major benefits of security awareness, training, and education programs accruing to an organization?
a.
Reducing fraudb.
Reducing unauthorized actionsc.
Improving employee behaviord.
Reducing errors and omissions98. In developing a data security program for an organization, who should be responsible for defining security levels and access profiles for each data element stored in the computer system?
a.
Database administratorb.
Systems programmerc.
Data ownerd.
Applications programmer