b. Ensuring policies are available through physical bulletin boards
c. Requiring a signed statement from all users that they will abide by the policies
d. Ensuring policies are available through electronic bulletin boards
164. Which of the following considers the loss of security objectives (i.e., confidentiality, integrity, and availability) that could be expected to have a limited, serious, or severe adverse effect on an organization’s operations, assets, systems, or individuals and on other organizations?
a. Low-impact
b. Moderate-impact
c. Potential impact
d. High-impact
165. Effective information systems security measures cannot be maintained due to which of the following reasons?
a. Lack of awareness
b. Lack of a policy
c. Lack of a procedure
d. Lack of enforcement
166. Sensitivity criteria for a computer-based information system are
a. The value of having an application system
b. The cost of developing and maintaining an application system
c. The value of having the needed information
d. The cost of not having an application system
167. What is the first thing to do upon unfriendly termination of an employee?
a. Complete a sign-out form immediately.
b. Send employee to the accounting department for the last paycheck.
c. Remove the system access quickly.
d. Send employee to the human resource department for benefits status.
168. Which of the following have similar structures and complementary objectives?
a. Training and awareness
b. Hackers and users
c. Compliance and common sense
d. Need-to-know and threats
A hacker is a person who attempts to compromise the security of an IT system, especially whose intention is to cause disruption or obtain unauthorized access to data. On the other hand, a user has the opposite objective, to use the system to fulfill his job duties. Hence, they conflict with each other.
Compliance means following the standards, rules, or regulations with no deviations allowed. On the other hand, common sense tells people to deviate when conditions are not practical. Hence, they conflict with each other.
Need-to-know means a need for access to information to do a job. Threats are actions or events that, if realized, can result in waste, fraud, abuse, or disruption of operations. Hence, they conflict with each other.
169. Establishing a data ownership program should be the responsibility of:
a. Functional users
b. Internal auditors
c. Data processors