Question

In: Computer Science

21. Janet is identifying the set of privileges that should be assigned to a new employee...

21. Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing? A. Identification B. Authentication C. Accountability D. Authorization

22. Which of the following would NOT be considered in the scope of organizational compliance efforts? A. Laws B. Company policy C. Internal audit D. Corporate culture

23. Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve? A. Reduced operating costs B. Access to a high level of expertise C. Developing in-house talent D. Building internal knowledge

24. What is NOT a good practice for developing strong professional ethics? A. Set the example by demonstrating ethics in daily activities B. Encourage adopting ethical guidelines and standards C. Assume that information should be free D. Inform users through security awareness training

25. Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing? A. Job rotation B. Least privilege C. Need-to-know D. Separation of duties

26. What is NOT a goal of information security awareness programs? A. Teach users about security objectives B. Inform users about trends and threats in security C. Motivate users to comply with security policy D. Punish users who violate policy

27. Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems. What type of document should she create? A. Baseline B. Policy C. Guideline D. Procedure

28. Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is NOT normally used to make these type of classification decisions? A. Value B. Sensitivity C. Criticality D. Threat

29. Marguerite is creating a budget for a software development project. What phase of the system life cycle is she undertaking? A. Project initiation and planning B. Functional requirements and definition C. System design specification D. Operations and maintenance

30. In an accreditation process, who has the authority to approve a system for implementation? A. Certifier B. Authorizing official (AO) C. System owner D. System administrator

Solutions

Expert Solution

Question 21:

The process of providing the access privileges to each employee of an organization is called as the authoeization. The employee having these privileges will authenticate himself and after that he/she can use these privileges.

Hence, the correct choice is authorization.

Question 22:

The laws are not governed by the organizational compliance programme. The compliance programme may require leal actions to identify the risks and frauds. The laws are not in the scope of this programme.

Hence, the correct choice is laws.

Question 23:

The third party service provider can handle security functions more effectively and the cost to operate these functions will be of third party service providers. The service providers have expertise in thei work.

Hence, the correct choice is access to a high level of expertise.

Question 24:

The practice of good professional ethics are as follows:

  • Set the examples for users by demonstrating ethics in daily life of users. Professionals must be serious about ethics, if they want their users to be serious about these ethics.
  • The professionals should adopt the ethical guidelines. They should make a difficult decision to set an example of ethics.
  • The users should be aware of their expected ethical behavior. The ethics should be used in daily life. Everyone should be aware of these ethics.

The users should not assume anything theirselves. It could lead to an unethical behavior. The third point is an assumption which leads the users to an unethical behavior.

Hence, the correct choice is assume that information should be free.

Question 25:

This type of control is used to prevent fraud. If a main activitis performed by all the users, then there will be a great chance of leaking some confidential information which could lead to a lose of the organization.

If an activity is separated into multiple tasks which will be performed by the different group of users, then the work will be performed more efficiently. This process is called as separation of duties.

Hence, the correct choice is separation of duties.

Question 26:

The security awareness programs can provide information about the importance of the security standards and breech of these security standards.

The punishment of users who violates the security ploicies is not included in the security awareness programs. It is the step after the violation of the policy.

Hece, the correct choice is punish users who violate policy.

Question 27:

A template containing the information about configuration will be created using baseline model in which the starting information will be provided.

Hence, the correct choice is baseline.

Question 28:

The threat is not the ethical way of doing things in an organization. The classification of an information can be based on value, sensitivity, and criticality of the information but not on the threat to anyone.

Hence, the correct choice is threat.

Question 29:

The budget analysis of a project is a part of the planning phase. The project will not be successful without analyzing the budget requirement of the project accurately. The budget analysis, objectives etc of a project needs to be done in the planning and initiation phase.

Hence, the correct choice is project initiation and planning.

Question 30:

The authorization officials have rights to approve the system for implementation because it is important to take approval before implementing a system.

Hence, the correct choice is authorizing officials.


Related Solutions

You are a new employee of a firm. before you are assigned your first audit
You are a new employee of a firm. before you are assigned your first audit, your supervisor tests your knowledge and asks you to explain the term "scope" in the context of the financial statement analysis.write 8-10 sentences.
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet...
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet has requested a cash budget for October. After examining the records of the company, you find the following: Cash balance on October 1 is $1,110. Actual sales for August and September are as follows: August September Cash sales $6,000     $4,500     Credit sales 59,000     62,000         Total sales $65,000     $66,500     Credit sales are collected over a three-month period: 40 percent in the month of sale, 36...
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet...
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet has requested a cash budget for October. After examining the records of the company, you find the following: Cash balance on October 1 is $1,120. Actual sales for August and September are as follows:     August      September Cash sales      $6,000        $4,500 Credit sales      58,000        62,000 Total sales      $64,000        $66,500 Credit sales are collected over...
Do you think clinical psychologists should be grantedprescription privileges? Why or why not? How, if...
Do you think clinical psychologists should be granted prescription privileges? Why or why not? How, if at all, might the ability to write prescriptions affect the practice of clinical psychology?
If you were a federal investigator assigned to a task force focused on identifying money laundering...
If you were a federal investigator assigned to a task force focused on identifying money laundering operations in your community, which types of businesses or organizations would you begin investigating based on the four methods commonly used by criminals to launder illegally earned money, and why.
Should New Zealand introduce incentives for employee contributions to Kiwisaver schemes as is found in Australia?...
Should New Zealand introduce incentives for employee contributions to Kiwisaver schemes as is found in Australia? could you talk more specifically about this topic and you may use some reference as evidence.
The seven quality tools identified in this week’s assigned reading provide structured analysis approaches for identifying...
The seven quality tools identified in this week’s assigned reading provide structured analysis approaches for identifying and solving problems. Select one of the seven tools specified in this week’s assigned reading. Use (Cause and Effect, Or problem solving). Describe its benefits in the context of a project example. Integrate the course readings and support the post with appropriate citations and references.
You are working as a consultant and are assigned the task to set up a secure...
You are working as a consultant and are assigned the task to set up a secure communication channel between three premises in the company. The communication should be using symmetric encryption with new keys exchanged on a daily basis. All premises have individual X.509 certificates. Describe a solution that includes how to carry out the encryption, key exchange and certifying that there is no malicious man-in-the-middle attempt Kindly answer this question in the field of Applied Computer Security....
QUESTION 21 chmod +t is used to: set timing information set group information set sticky bit...
QUESTION 21 chmod +t is used to: set timing information set group information set sticky bit set transit information 1 points    QUESTION 22 When two or processes are waiting indefinitely for an event that can be caused by only one of the waiting processes, we call this as: Race condition Deadlock Starvation None of the above 1 points    QUESTION 23 ___________ is a fast disk space, large enough to store data for all users. Hard disk Main memory...
What are the most important things to consider when identifying a model to fit a set...
What are the most important things to consider when identifying a model to fit a set of data? Be sure to list as many characteristics as you can, but don't be afraid to share any thoughts, ideas, or uncertainties you may have about a particular model. If you're unsure about something, just ask some clarifying questions to help you get a better idea of what the model's key features are. Your post must have a minimum of 5 sentences.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT