Effectiveness/efficiency metrics measure the results of security services delivery (i.e., monitors the results of security controls implementation). Implementation metrics measure the results of implementation of security policies, procedures, and controls (i.e., demonstrates progress in implementation efforts).
213. Which of the following is a prerequisite to IT security training?
a.
Security basicsb.
Awarenessc.
Security literacyd.
Education214. The security objective or principle of integrity does
a.
Accuracyb.
Privacyc.
Non-repudiationd.
AccountabilityIntegrity is the property that protected and sensitive data has not been modified or deleted in an unauthorized and undetected manner. Accuracy is a qualitative assessment of correctness of data or freedom from error (i.e., data needs integrity). Non-repudiation is a service that is used to provide assurance of the integrity and origin of data in such a way that the integrity and origin can be verified and validated by a third party. Accountability generates the requirements for actions of an individual to be traced uniquely to that individual (i.e., supports prevention, detection, fault isolation, and non-repudiation). Hence, accuracy, accountability, and non-repudiation all require that data and information must have integrity. If data that an individual is handling is not accurate and if an individual can deny sending or receiving a message, how can that individual be held accountable for his actions? Note that the terms integrity, accuracy, non-repudiation, and accountability have different definitions and meanings depending on the context of use.
215. Which of the following verifies that the other three security principles have been adequately met by a specific implementation?
a.
Assuranceb.
Integrityc.
Confidentialityd.
Availability216. Regarding information security governance, which of the following should take place for noncompliance?
a.
Change in policiesb.
Change in proceduresc.
Change in practicesd.
Periodic assessments217. Which of the following must be considered when the system boundaries are drawn and when establishing a control baseline?
a.
Confidentialityb.
Impact levelsc.
Integrityd.
Availability218. Which of the following is
a.
Reproducibilityb.
Utilityc.
Integrityd.
Objectivity