c251-3b

c251-3b

University

30 Qs

quiz-placeholder

Similar activities

System Development Life Cycle SDLC

System Development Life Cycle SDLC

10th Grade - University

25 Qs

ISC2 - CC - Chapter 1 - Module 4

ISC2 - CC - Chapter 1 - Module 4

University

26 Qs

IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

University

25 Qs

IoT workshop

IoT workshop

University

25 Qs

week 6 workshop quiz for sec+

week 6 workshop quiz for sec+

University - Professional Development

25 Qs

6.0 SDLC

6.0 SDLC

University

30 Qs

Software Engineering

Software Engineering

University

27 Qs

QUIZ-KnPI

QUIZ-KnPI

University

30 Qs

c251-3b

c251-3b

Assessment

Quiz

Computers

University

Medium

Created by

David Berryman

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Individuals who control, and are therefore responsible for, the security and use of a particular set of information are known as ____________.
data owners
data custodians
data users
data generators

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first phase of the SecSDLC?
analysis
investigation
logical design
physical design

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual responsible for the assessment, management, and implementation of information-protection activities in the organization is known as a(n) ____________.
chief information security officer
security technician
security manager
chief technology officer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which phase of the SecSDLC does the risk management task occur?
physical design
implementation
investigation
analysis

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An example of a company stakeholder includes all of the following EXCEPT:
employees
the general public
stockholders
management

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A project manager who understands project management, personnel management, and InfoSec technical requirements is needed to fill the role of a(n) ____________.
champion
auditor
team leader
policy developer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified by the CISO, and resolving issues identified by technicians is known as a(n) ____________.
chief information security officer
security technician
security manager
chief technology officer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?