Planning and Implementation of Information Security

Planning and Implementation of Information Security

University

10 Qs

quiz-placeholder

Similar activities

Pop Quiz (T1.1) - 07/02/24

Pop Quiz (T1.1) - 07/02/24

University

10 Qs

MANAGEMENT INFORMATION SYSTEMS

MANAGEMENT INFORMATION SYSTEMS

University

15 Qs

Information Security Principles

Information Security Principles

University

10 Qs

EGIT 2025

EGIT 2025

University

11 Qs

SKJ4632

SKJ4632

University

10 Qs

CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

University

10 Qs

20CA2017 - Fundamentals of Business - Busi metr & KPI

20CA2017 - Fundamentals of Business - Busi metr & KPI

University

10 Qs

Information Systems - Quiz 2

Information Systems - Quiz 2

University

8 Qs

Planning and Implementation of Information Security

Planning and Implementation of Information Security

Assessment

Quiz

Computers

University

Hard

Created by

AZAH NORMAN

Used 79+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responsibility and authority structures are ill-defined or not defined at all, it results in a breakdown of the __________ systems

legal control

informal control

formal control

technical control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identifying operating objectives and goals and costing security initiatives are key decisions under the __________ class.

legal

strategic

operational

administrative

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At a __________ level, the security strategy looks into the threats and weaknesses of the IT infrastructure.

corporate

operational

business

functional

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of __________ helps organizations establish access rules to systems.

security strategy and policy

role and skill

business process

responsibility and authority structure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clearly adopting adequate __________ will go a long way in establishing good management practices and will set the scene for effective computer crime management.

compliance

tools

structures

technologies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information flows in organizations have to match with __________ in order to ensure the integrity of the operations.

security and strategy policy

role and skill

responsibility and authority structure

business process

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarification of the __________ agenda sets the stage for developing the security model.

strategic

ownership

operational

managerial

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?