b.
Ensuring policies are available through physical bulletin boardsc.
Requiring a signed statement from all users that they will abide by the policiesd.
Ensuring policies are available through electronic bulletin boards164. Which of the following considers the loss of security objectives (i.e., confidentiality, integrity, and availability) that could be expected to have a limited, serious, or severe adverse effect on an organization’s operations, assets, systems, or individuals and on other organizations?
a.
Low-impactb.
Moderate-impactc.
Potential impactd.
High-impact165. Effective information systems security measures cannot be maintained due to which of the following reasons?
a.
Lack of awarenessb.
Lack of a policyc.
Lack of a procedured.
Lack of enforcement166. Sensitivity criteria for a computer-based information system are
a.
The value of having an application systemb.
The cost of developing and maintaining an application systemc.
The value of having the needed informationd.
The cost of not having an application system167. What is the first thing to do upon unfriendly termination of an employee?
a.
Complete a sign-out form immediately.b.
Send employee to the accounting department for the last paycheck.c.
Remove the system access quickly.d.
Send employee to the human resource department for benefits status.168. Which of the following have similar structures and complementary objectives?
a.
Training and awarenessb.
Hackers and usersc.
Compliance and common sensed.
Need-to-know and threatsA hacker is a person who attempts to compromise the security of an IT system, especially whose intention is to cause disruption or obtain unauthorized access to data. On the other hand, a user has the opposite objective, to use the system to fulfill his job duties. Hence, they conflict with each other.
Compliance means following the standards, rules, or regulations with no deviations allowed. On the other hand, common sense tells people to deviate when conditions are not practical. Hence, they conflict with each other.
Need-to-know means a need for access to information to do a job. Threats are actions or events that, if realized, can result in waste, fraud, abuse, or disruption of operations. Hence, they conflict with each other.
169. Establishing a data ownership program should be the responsibility of:
a.
Functional usersb.
Internal auditorsc.
Data processors