Planning and Implementation of Information Security

Planning and Implementation of Information Security

University

10 Qs

quiz-placeholder

Similar activities

Quis Administrasi Sistem Jaringan

Quis Administrasi Sistem Jaringan

University

15 Qs

VITAP Quiz-1

VITAP Quiz-1

University

10 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Tipos Ecommerce

Tipos Ecommerce

University

10 Qs

2.4 - 2.6

2.4 - 2.6

University

15 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

ADVACOMT-Quiz No.1 (final term)

ADVACOMT-Quiz No.1 (final term)

University

15 Qs

Planning and Implementation of Information Security

Planning and Implementation of Information Security

Assessment

Quiz

Computers

University

Hard

Created by

AZAH NORMAN

Used 79+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When responsibility and authority structures are ill-defined or not defined at all, it results in a breakdown of the __________ systems

legal control

informal control

formal control

technical control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identifying operating objectives and goals and costing security initiatives are key decisions under the __________ class.

legal

strategic

operational

administrative

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At a __________ level, the security strategy looks into the threats and weaknesses of the IT infrastructure.

corporate

operational

business

functional

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A definition of __________ helps organizations establish access rules to systems.

security strategy and policy

role and skill

business process

responsibility and authority structure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clearly adopting adequate __________ will go a long way in establishing good management practices and will set the scene for effective computer crime management.

compliance

tools

structures

technologies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information flows in organizations have to match with __________ in order to ensure the integrity of the operations.

security and strategy policy

role and skill

responsibility and authority structure

business process

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarification of the __________ agenda sets the stage for developing the security model.

strategic

ownership

operational

managerial

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?