67. Which of the following are required to enforce system-specific policies?
1. Logical access controls
2. Physical security measures
3. Management controls
4. Technical controls
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
68. Benefits of central computer security programs include which of the following?
1. Sharing information
2. Installing technical controls
3. Controlling virus infections
4. Administering day-to-day computer security
a. 1 and 2
b. 1 and 3
c. 2 and 3
d. 2 and 4
69. Which of the following are essential to improving IT security performance through metrics?
1. Quantifying performance gaps
2. Providing insights into root causes
3. Submitting reports to internal management
4. Collecting meaningful data for analysis
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
70. The concept of least privilege is primarily based on which of the following?
a. Risk assessment
b. Information flow enforcement
c. Access enforcement
d. Account management
71. Results-based training does
a. Roles and responsibilities
b. Understanding levels
c. Job titles
d. Backgrounds
72. Which of the following are essential to reach a higher rate of success in protecting information?
1. Proven security tools and techniques
2. Encouraging professional certification
3. Training employees in security policies
4. Role-based security responsibilities
a. 1 and 2
b. 2 and 3
c. 1 and 4
d. 3 and 4
Proven security tools and techniques and encouraging professional certification indirectly support training employees in security policies and role-based security responsibilities.
73. Which of the following is the ultimate purpose of information security performance metrics?
a. To pinpoint problems
b. To scope resources for remediation
c. To track ownership of data
d. To improve information security
Intermediate benefits of performance measurement, leading to the ultimate purpose, include assisting with pinpointing problems, scoping the resources for remediation, tracking the status of remediation, and quantifying successes. Measurement also creates accountability for results by tracking ownership of data and its related activities.