In: Computer Science
1.A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?
a Health Insurance Portability and Accountability Act (HIPAA)
b. Payment Card Industry Data Security Standard (PCI DSS)
c.Federal Information Security Management Act (FISMA)
d Federal Financial Institutions Examination Council (FFIEC)
2. What level of technology infrastructure should you expect to find in a cold site alternative data center facility?
a. Hardware and data that mirror the primary site
b. Hardware that mirrors the primary site, but no data
c. Basic computer hardware
d. No technology infrastructure
3.George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. What methodology is best suited for George's use?
a Risk Management Guide for Information Technology Systems (NIST SP800-30)
b CCTA Risk Analysis and Management Method (CRAMM)
c Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
d ISO/IEC 27005, “Information Security Risk Management”
1.
A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Payment Card Industry Data Security Standard (PCI DSS) governs the privacy of information handled by those point-of-sale terminals.
Option b
2.
No technology infrastructure level of technology infrastructure should you expect to find in a cold site alternative data center facility.
Option d
3.
George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. Risk Management Guide for Information Technology Systems (NIST SP800-30) methodology is best suited for George's use.
Option a