In the context of security standards and compliance, which two (2) of these items are goals of frameworks and best practices?


Question 1

In the context of security standards and compliance, which two (2) of these items are goals of frameworks and best practices?

1 / 1 point

They are rules to follow for a specific industry.

They serve as an enforcement mechanism for government, industry or clients.

They seek to improve performance, controls and metrics.

Correct

Partially correct! The goal is improvement.

They help translate the business needs into technical or operational needs.

Correct

Partially correct! They can guide you in how this was done successfully before or by others.

2.

Question 2

A company document that says employees may not do online shopping while at work would be which of the following?

1 / 1 point

Policy

Procedure

Tactical Plan

Strategic Plan

Correct

Correct! This rule would be contained in a company’s policy on Internet access.

3.

Question 3

Which three (3) of these are compliance standards that must be adhered to by companies is some industries / countries?

1 / 1 point

SOX

Correct

Partially correct! SOX is short for Sarbanes-Oxley Act, an accounting law in the United States.

PCI/DSS

Correct

Partially correct! PCI/DSS is short for Payment Card Industry Data Security Standard, an information security standard for those processing credit card transactions.

OCTAVE

HIPPA

Correct

Partially correct! HIPPA is short for Health Insurance Portability and Accountability Act, a healthcare data privacy law in the United States.

4.

Question 4

A method of evaluating computer and network security by simulating an attack on a computer system or network from external or internal threats is know as which of the following?

1 / 1 point

A pentest

A white hat

A hack

A threat

Correct

Correct! Ethical (with permission) penetration testing is a very effective way to assess system security.

5.

Question 5

The OWASP “Top 10” provides guidance on what?

1/ 1 point

The top 10 cybercrimes reported each year.

The top 10 network vulnerabilities reported each year.

The top 10 malware exploits reported each year.

The top 10 application vulnerabilities reported each year.

Click here to order similar paper @Udessaywriters.com.100% Original.Written from scratch by professional writers.

You May Also Like

About the Author: admin