Question

In: Computer Science

21. Janet is identifying the set of privileges that should be assigned to a new employee...

21. Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing? A. Identification B. Authentication C. Accountability D. Authorization

22. Which of the following would NOT be considered in the scope of organizational compliance efforts? A. Laws B. Company policy C. Internal audit D. Corporate culture

23. Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve? A. Reduced operating costs B. Access to a high level of expertise C. Developing in-house talent D. Building internal knowledge

24. What is NOT a good practice for developing strong professional ethics? A. Set the example by demonstrating ethics in daily activities B. Encourage adopting ethical guidelines and standards C. Assume that information should be free D. Inform users through security awareness training

25. Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing? A. Job rotation B. Least privilege C. Need-to-know D. Separation of duties

26. What is NOT a goal of information security awareness programs? A. Teach users about security objectives B. Inform users about trends and threats in security C. Motivate users to comply with security policy D. Punish users who violate policy

27. Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems. What type of document should she create? A. Baseline B. Policy C. Guideline D. Procedure

28. Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is NOT normally used to make these type of classification decisions? A. Value B. Sensitivity C. Criticality D. Threat

29. Marguerite is creating a budget for a software development project. What phase of the system life cycle is she undertaking? A. Project initiation and planning B. Functional requirements and definition C. System design specification D. Operations and maintenance

30. In an accreditation process, who has the authority to approve a system for implementation? A. Certifier B. Authorizing official (AO) C. System owner D. System administrator

Solutions

Expert Solution

Question 21:

The process of providing the access privileges to each employee of an organization is called as the authoeization. The employee having these privileges will authenticate himself and after that he/she can use these privileges.

Hence, the correct choice is authorization.

Question 22:

The laws are not governed by the organizational compliance programme. The compliance programme may require leal actions to identify the risks and frauds. The laws are not in the scope of this programme.

Hence, the correct choice is laws.

Question 23:

The third party service provider can handle security functions more effectively and the cost to operate these functions will be of third party service providers. The service providers have expertise in thei work.

Hence, the correct choice is access to a high level of expertise.

Question 24:

The practice of good professional ethics are as follows:

  • Set the examples for users by demonstrating ethics in daily life of users. Professionals must be serious about ethics, if they want their users to be serious about these ethics.
  • The professionals should adopt the ethical guidelines. They should make a difficult decision to set an example of ethics.
  • The users should be aware of their expected ethical behavior. The ethics should be used in daily life. Everyone should be aware of these ethics.

The users should not assume anything theirselves. It could lead to an unethical behavior. The third point is an assumption which leads the users to an unethical behavior.

Hence, the correct choice is assume that information should be free.

Question 25:

This type of control is used to prevent fraud. If a main activitis performed by all the users, then there will be a great chance of leaking some confidential information which could lead to a lose of the organization.

If an activity is separated into multiple tasks which will be performed by the different group of users, then the work will be performed more efficiently. This process is called as separation of duties.

Hence, the correct choice is separation of duties.

Question 26:

The security awareness programs can provide information about the importance of the security standards and breech of these security standards.

The punishment of users who violates the security ploicies is not included in the security awareness programs. It is the step after the violation of the policy.

Hece, the correct choice is punish users who violate policy.

Question 27:

A template containing the information about configuration will be created using baseline model in which the starting information will be provided.

Hence, the correct choice is baseline.

Question 28:

The threat is not the ethical way of doing things in an organization. The classification of an information can be based on value, sensitivity, and criticality of the information but not on the threat to anyone.

Hence, the correct choice is threat.

Question 29:

The budget analysis of a project is a part of the planning phase. The project will not be successful without analyzing the budget requirement of the project accurately. The budget analysis, objectives etc of a project needs to be done in the planning and initiation phase.

Hence, the correct choice is project initiation and planning.

Question 30:

The authorization officials have rights to approve the system for implementation because it is important to take approval before implementing a system.

Hence, the correct choice is authorizing officials.


Related Solutions

You are a new employee of a firm. before you are assigned your first audit
You are a new employee of a firm. before you are assigned your first audit, your supervisor tests your knowledge and asks you to explain the term "scope" in the context of the financial statement analysis.write 8-10 sentences.
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet...
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet has requested a cash budget for October. After examining the records of the company, you find the following: Cash balance on October 1 is $1,110. Actual sales for August and September are as follows: August September Cash sales $6,000     $4,500     Credit sales 59,000     62,000         Total sales $65,000     $66,500     Credit sales are collected over a three-month period: 40 percent in the month of sale, 36...
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet...
Cash Budget Janet Wooster owns a retail store that sells new and used sporting equipment. Janet has requested a cash budget for October. After examining the records of the company, you find the following: Cash balance on October 1 is $1,120. Actual sales for August and September are as follows:     August      September Cash sales      $6,000        $4,500 Credit sales      58,000        62,000 Total sales      $64,000        $66,500 Credit sales are collected over...
Ideally, the performance management process should be outlined to a new employee during the recruitment and...
Ideally, the performance management process should be outlined to a new employee during the recruitment and selection process. Commonly overlooked,discuss why this is an important activity to be auctioned by human resource practitioners.
Do you think clinical psychologists should be grantedprescription privileges? Why or why not? How, if...
Do you think clinical psychologists should be granted prescription privileges? Why or why not? How, if at all, might the ability to write prescriptions affect the practice of clinical psychology?
21. Consider the code below: [13] Employee class: class Employee { public: Employee(string theName, float thePayRate);...
21. Consider the code below: [13] Employee class: class Employee { public: Employee(string theName, float thePayRate); protected: string getName() const; float getPayRate() const; float pay(float hoursWorked) const; private: string name; float payRate; }; Definitions for some of the methods follow: Employee::Employee(string theName, float thePayRate) { name = theName; payRate = thePayRate; } float Employee::pay(float hoursWorked) const { return hoursWorked * payRate; } Manager Class: #include "employee.h" class Manager : public Employee { public: Manager(string theName, float thePayRate, bool isSalaried); protected:...
If you were a federal investigator assigned to a task force focused on identifying money laundering...
If you were a federal investigator assigned to a task force focused on identifying money laundering operations in your community, which types of businesses or organizations would you begin investigating based on the four methods commonly used by criminals to launder illegally earned money, and why.
Should New Zealand introduce incentives for employee contributions to Kiwisaver schemes as is found in Australia?...
Should New Zealand introduce incentives for employee contributions to Kiwisaver schemes as is found in Australia? could you talk more specifically about this topic and you may use some reference as evidence.
The seven quality tools identified in this week’s assigned reading provide structured analysis approaches for identifying...
The seven quality tools identified in this week’s assigned reading provide structured analysis approaches for identifying and solving problems. Select one of the seven tools specified in this week’s assigned reading. Use (Cause and Effect, Or problem solving). Describe its benefits in the context of a project example. Integrate the course readings and support the post with appropriate citations and references.
You are working as a consultant and are assigned the task to set up a secure...
You are working as a consultant and are assigned the task to set up a secure communication channel between three premises in the company. The communication should be using symmetric encryption with new keys exchanged on a daily basis. All premises have individual X.509 certificates. Describe a solution that includes how to carry out the encryption, key exchange and certifying that there is no malicious man-in-the-middle attempt Kindly answer this question in the field of Applied Computer Security....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT