Planning and Implementation of Information Security

Planning and Implementation of Information Security

University

10 Qs

quiz-placeholder

Similar activities

Information Systems - Quiz 2

Information Systems - Quiz 2

University

8 Qs

SMP11603 Week 2

SMP11603 Week 2

University

10 Qs

MIS Chapter 2

MIS Chapter 2

University

15 Qs

Information Systems - IS applications

Information Systems - IS applications

University

8 Qs

EGIT 2025

EGIT 2025

University

11 Qs

CN3303 Lecture 3 Business Risk and Continuity

CN3303 Lecture 3 Business Risk and Continuity

University

10 Qs

CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

University

10 Qs

20CA2017 - Fundamentals of Business - Busi metr & KPI

20CA2017 - Fundamentals of Business - Busi metr & KPI

University

10 Qs

Planning and Implementation of Information Security

Planning and Implementation of Information Security

Assessment

Quiz

Computers

University

Hard

Created by

AZAH NORMAN

Used 79+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responsibility and authority structures are ill-defined or not defined at all, it results in a breakdown of the __________ systems

legal control

informal control

formal control

technical control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identifying operating objectives and goals and costing security initiatives are key decisions under the __________ class.

legal

strategic

operational

administrative

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At a __________ level, the security strategy looks into the threats and weaknesses of the IT infrastructure.

corporate

operational

business

functional

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of __________ helps organizations establish access rules to systems.

security strategy and policy

role and skill

business process

responsibility and authority structure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clearly adopting adequate __________ will go a long way in establishing good management practices and will set the scene for effective computer crime management.

compliance

tools

structures

technologies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information flows in organizations have to match with __________ in order to ensure the integrity of the operations.

security and strategy policy

role and skill

responsibility and authority structure

business process

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarification of the __________ agenda sets the stage for developing the security model.

strategic

ownership

operational

managerial

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?