CIPPS-ISSMP / Book question Flashcards
(232 cards)
Which best fits an organizations mission statement:
A. Are non-technical in nature, so ISSMPs do not have to understand them.
B. Are quickly put together by senior management.
C. Provide everyone in the organization overall direction and focus for their activities.
D. Are very specific and provide specific goals and objectives.
C. Provide everyone in the organization overall direction and focus for their activities.
Which types of organizations need to have a formally documented mission statement?
A. Commerical enterprises
B. Non-Profit organizations.
C. Government agencies
D. All the above.
D. All of the above.
Deploying internet security solutions that are acceptable by clients require knowing the clients?
A. Expections & Location
B. Locatoin & Technical knowledge
C. System Capabilities & expectations
D. Expectations & technical knowledge.
C. System Capabilities and Expectations
All organization security solutions are influenced by the following.
A. Laws, employee culture, profit and competition.
B. Goals, client expectations, regulations and profit.
C. Group and client expectations, competitions and capabilities.
D. Profit, organization objectives, client capabilities and senior management.
C. Group and client expectations, competitions and capabilities.
A systems security solution must be.
A. Cost effective, risk based and acceptable.
B. Risk based, within division budget and restraints.
C. Practical, and 90% effective
D. Acceptable by senior management and provide an ROI (return on investment)
A. Cost effective, risk based and acceptable.
A specific piece of information’s level of classification is dependent on_
A. Need to know.
B. Cost of producing the information.
C. Impact if compromised.
D. Affordability of required security.
C. Impact if compromised.
System secuirty boundary must be determined early based on all BUT the following.
A. Understanding the mission, goals and objectivies.
B. Coordinating the review with end users.
C. Identifing the system components that support each of the business functions.
D. Determining who is operationally and fiscally responsible for the system.
B. Coordinating the review with end users.
Security boundary is important to establishing_
A. who will be doing the certification effort
B. Scoping the security effort.
C. Determining which regulations and laws apply.
D. If a system will need an internet connection or not.
B. Scoping the security effort.
The implementation phase of the system development life cycle includes?
A. Conducting an intial security test
B. Identifing security solutions
C. Determining if the security is acceptable to operate.
D. Defining the system security requirements.
C. Determining if the security is acceptable to operate.
The ISSMP’s job is to provide security support at the end of which phase in the SDLC?
A. Disposition and Disposal
B. Operation and Maintenance
C. Implementation
D. Initiation
A. Disposition and Disposal
Risk Assessments are done in which phase of the SDLC?
A. Intitation
B. Intitation and Implementation
C. Implementation, disposition and disposal
D. Initiation, Implementation, operations and maintenance.
D. Initiation, Implementation, operations and maintenance.
Who sets the information security standards of the public sector?
A. National Security Agency.
B. Internation Organization for Standardization.
C. National Institue of Standard and Technology.
D. International Electrotechnical Commission.
C. National Institue of Standard and Technology.
Families of controls are identified in which of the following documents.
A. NIST Special Pub 8005.3
B. ISO 27002
C. DoDI 8500.2
D. All of the above
D. All of the above
The ISSMP decides between using quantitative and qualitative risk assessments based on?
A. The budget process.
B. Threats
C. Vulnerabilities
D. Management decision process
D. Management decision process
Assurances are those activities that provide management with what about security solutions?
A. Due Diligence
B. Protection
C. Cost effectiveness
D. ROI (return on investment)
A. Due Diligence
Which of the following provides a measure of how well an organziation’s process incluleds the capability to continuously improve its processes.
A. Common criteria evaluation and validation scheme.
B. octave.
C. Software engineering institutes capability maturity model.
D. Commonly accepted security practices and regulations.
C. Software engineering institutes capability maturity model.
Interconnections with other systems outside the system security boundary can have the following effect.
A. Increased dependencies to support the others system security requirements.
B. Requirement to notifiy when security event occurs on your system.
C. Obligations to inform the other system when outages are going to occur.
D. All the above.
D. All the above.
Annal loss expectancy and ROI are expressed in what units?
A. Currency and Percentages.
B. Percentages and Level of Risk.
C. Cost of security and Percentages.
D. Percentages and Savings.
A. Currency and Percentages.
Plan of Actions and Milestones is?
A. A security plan
B. A management tool
C. A list of all system security solutions
D. a checklist of actions for monitoring security during the implementation phase.
B. A management tool
The ideal presentation to senior management and mangers should follow which rules.
A. 20-page justification
B. 5 slides
C. Answer all the questions that the audience should ask.
D. Be presented in 5 minutes.
D. Be presented in 5 minutes.
How does the need for security compare between systems developed for sale or external use and systems developed for inhouse.
A. systems for sale or external use always have more security concerns.
B. Systems developed for inhouse use alawys have more securiyt concerns.
C. System developed inhouse require security efforts on the part of the internal security team, while those developed for external use can have security outsourced.
D. Both systems have security concerns that must be carefully addressed.
D. Both systems have security concerns that must be carefully addressed.
When should a projects security measures be addressed.
A. As close to the start of the project as possible.
B. Only after security issues are exploited.
C. After the initial project design is done.
D. When the functional specifications are being written.
A. As close to the start of the project as possible.
Which of the following pose the greatest risk of perpetrating a catastrophic threat to an organization’s valuable data without expending great resources?
A. Foreign governmnets and their sponsored hackers
B. Employees
C. Activist for hacktivist groups such as anonymous
D. Customers
B. Employees
How does the use of rapid application development (RAD) affect security planning.
A. The compressed time between releases means security planning and concerns must be brought up early and stressed often.
B. The process of reactive development means security is built in automatically.
C. Security issues are more common in RAD projects.
D. Security issues are less common in RAD projects.
A. The compressed time between releases means security planning and concerns must be brought up early and stressed often.