Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONs2

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
s2

Description:
CS698 sameh ali

Author:
AVATAR

Creation Date:
06/03/2021

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Every access to every object must be checked for authority Economy of mechanism Fail-safe defaults Complete mediation Open design.
The design should not be secret; but rather depend on the possession of keys or passwords. Economy of mechanism Fail-safe defaults Complete mediation Open design.
Where feasible; a protection mechanism should require two keys to unlock; rather than one Separation of privilege Least privilege Least common mechanism Psychological acceptability.
Every program and every user of the system should operate using the least set of privileges necessary to complete the job. Separation of privilege Least privilege Least common mechanism Psychological acceptability.
Minimize mechanisms (or shared variables) common to more than one user and depended on by all users Separation of privilege Least privilege Least common mechanism Psychological acceptability.
It is essential that the human interface be designed for ease of use; so that users routinely and automatically apply the protection mechanisms correctly Separation of privilege Least privilege Least common mechanism Psychological acceptability.
The CIO translates the strategic plans of the organization as a whole into strategic information plans for the information systems or data processing division of the organization. An executive-level position that oversees the organization’s computing technology and strives to create efficiency in the processing and access of the organization’s information chief information officer (CIO) chief information security officer (CISO) Project team Champion.
Typically considered the top information security officer in an organization chief information officer (CIO) chief information security officer (CISO) Project team Champion.
A small functional team of people who are experienced in one or multiple facets of the required technical and nontechnical areas for the project to which they are assigned chief information officer (CIO) chief information security officer (CISO) Project team Champion.
A senior executive who promotes the project and ensures its support; both financially and administratively; at the highest levels of the organization chief information officer (CIO) chief information security officer (CISO) Project team Champion.
A project manager who may also be a departmental line manager or staff unit manager; and who understands project management; personnel management; and information security technical requirements. Team leader Security policy developers Risk assessment specialists Security professionals.
People who understand the organizational culture; existing policies; and requirements for developing and implementing successful policies. Team leader Security policy developers Risk assessment specialists Security professionals.
People who understand financial risk assessment techniques; the value of organizational assets; and the security methods to be used Team leader Security policy developers Risk assessment specialists Security professionals.
Dedicated; trained; and well-educated specialists in all aspects of information security from both a technical and nontechnical standpoint Team leader Security policy developers Risk assessment specialists Security professionals.
People with the primary responsibility for administering systems that house the information used by the organization Systems administrators End users data custDdians Security as Art.
Those whom the new system will most directly affect. Ideally; a selection of users from various departments; levels; and degrees of technical knowledge assist the team in focusing on the application of realistic controls that do not disrupt the essential business activities they seek to safeguard Systems administrators End users data custDdians Security as Art.
Individuals who work directly with data owners and are responsible for storage; maintenance; and protection of information. Systems administrators End users data custDdians Security as Art.
The administrators and technicians who implement security can be compared to a painter applying oils to canvas. A touch of color here; a brush stroke there; just enough to represent the image the artist wants to convey without overwhelming the viewer—or in security terms; without overly restricting user access Systems administrators End users data custDdians Security as Art.
Technology developed by computer scientists and engineers—which is designed for rigorous performance levels—makes information security a science as well as an art Security as Science Security as a Social Science delete.
Social science examines the behavior of people as they interact with systems; whether they are societal systems or; as in this context; information systems Security as Science Security as a Social Science delete .
To protect the confidentiality of information; you can use several measures; including the following Information classification A direct attack Indirect attack Control; safeguard; or countermeasure.
To protect the confidentiality of information; you can use several measures; including the following: Exploit Secure document storage Loss Risk.
To protect the confidentiality of information; you can use several measures; including the following: Subjects and objects of attack Threat Application of general security policies Threat event.
To protect the confidentiality of information; you can use several measures; including the following: Threat source Vulnerability Accuracy Education of information custodians and end users.
For detecting a virus or worm is to look for changes in file integrity; as shown by The file size. Confidentiality Personally Identifiable Information (PII) Integrity.
For detecting a virus or worm is to look for changes in file integrity; as shown by Attack File hashing Indirect attack Control; safeguard; or countermeasure .
Secure Software Assurance (SwA) Common Body of Knowledge (CBK) examine two key questions Exploit Exposure What are the engineering activities or aspects of activities that are relevant to achieving secure software? Risk.
Secure Software Assurance (SwA) Common Body of Knowledge (CBK) examine two key questions Subjects and objects of attack Threat Threat agent What knowledge is needed to perform these activities or aspects?.
The SwA CBK; which is a work in progress; contains the following sections: Nature of Dangers Vulnerability Accuracy Authenticity.
The SwA CBK; which is a work in progress; contains the following sections: Availability Fundamental Concepts and Principles Integrity Personally Identifiable Information (PII).
The SwA CBK; which is a work in progress; contains the following sections: Attack A direct attack Ethics; Law; and Governance Control; safeguard; or countermeasure.
The SwA CBK; which is a work in progress; contains the following sections: Exploit Exposure Loss Secure Software Requirements.
The SwA CBK; which is a work in progress; contains the following sections: Secure Software Design Threat Threat agent Threat agent.
The SwA CBK; which is a work in progress; contains the following sections: Threat source Secure Software Construction Accuracy Authenticity.
The SwA CBK; which is a work in progress; contains the following sections: Availability Confidentiality Secure Software Verification; Validation; and Evaluation Personally Identifiable Information (PII).
The SwA CBK; which is a work in progress; contains the following sections: Attack A direct attack Indirect attack Secure Software Tools and Methods.
The SwA CBK; which is a work in progress; contains the following sections: Secure Software Processes Exposure Loss Risk.
The SwA CBK; which is a work in progress; contains the following sections Subjects and objects of attack Secure Software Project Management Threat agent Threat agent.
The SwA CBK; which is a work in progress; contains the following sections: Threat source Vulnerability Acquisition of Secure Software Authenticity.
The SwA CBK; which is a work in progress; contains the following sections Availability Confidentiality Integrity ملوش حل .
They carry the authority of a governing body laws Ethics Aggregate information Information aggregation.
They are based on cultural mores laws Ethics Aggregate information Information aggregation.
Collective data that relates to a group or category of people and that has been altered to remove characteristics or components that make it possible to identify individuals within the group laws Ethics Aggregate information Information aggregation.
Pieces of nonprivate data that- when combined- may create information that violates privacy. Not to be confused with aggregate information laws Ethics Aggregate information Information aggregation.
In the context of information security- the right of individuals or groups to protect themselves and their information from unauthorized access- providing confidentiality. Privacy Association of Computing Machinery (ACM) Federal Bureau of Investigation (FBI) Payment Card Industry Data Security Standards (PCI DSS).
It is a respected professional society that was established in 1947 as “the world’s first educational and scientific computing society.” Privacy Association of Computing Machinery (ACM) Federal Bureau of Investigation (FBI) Payment Card Industry Data Security Standards (PCI DSS).
It investigates both traditional crimes and cybercrimes- and works with the U.S. Privacy Association of Computing Machinery (ACM) Federal Bureau of Investigation (FBI) Payment Card Industry Data Security Standards (PCI DSS).
It is organization that process payment cards- such as credit cards- debit cards- ATM cards- store-value cards- gift cards- or other related items Privacy Association of Computing Machinery (ACM) Federal Bureau of Investigation (FBI) Payment Card Industry Data Security Standards (PCI DSS).
The desired end of a planning cycle. goals objectives strategic plan strategic planning.
The intermediate states obtained to achieve progress toward a goal or goals. goals objectives strategic plan strategic planning.
Report abuse Consent Terms of use