74. What should the information security manager do when the residual risk has
a. Repeat the risk management cycle.
b. Develop new policies and procedures.
c. Implement new security technologies.
d. Establish a specific schedule for assessing risk.
75. The level of protection for an IT system is determined by an evaluation of which of the following elements?
1. Availability
2. Integrity
3. Sensitivity
4. Criticality
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
76. Which of the following IT metrics types measure the results of security services delivery?
1. Implementation metrics
2. Effectiveness metrics
3. Efficiency metrics
4. Impact metrics
a. 1 and 2
b. 2 and 3
c. 1 and 4
d. 3 and 4
77. Which of the following factors affects the trustworthiness of an information system?
1. Security functionality
2. Security categorization
3. Security certification
4. Security assurance
a. 1 and 2
b. 1 and 4
c. 3 and 4
d. 1, 2, 3, and 4
Security categorization and security certification are not relevant here because security categorization classifies systems according to security levels, and security certification deals with approving a new system prior to its operation.
78. When engaging information system services from an external service provider, which of the following is needed to mitigate security risk?
a. Chain-of-custody
b. Chain-of-command
c. Chain-of-documents
d. Chain-of-trust
Chain-of-custody refers to preserving evidence, and it may include chain-of-documents. Chain-of-command is a management principle, which follows job hierarchy in giving orders to subordinate employees by a supervising employee.
79. From a security viewpoint, which of the following is the most important document prepared by an external information system service provider?
a. Service provider security role
b. End user security role
c. Memorandum of agreement
d. Service-level agreement
80. The results of information-security program assessment reviews can be used to do which of the following?
1. To support the certification and accreditation process
2. To support the continuing monitoring requirement
3. To prepare for audits