Effectiveness/efficiency metrics measure the results of security services delivery (i.e., monitors the results of security controls implementation). Implementation metrics measure the results of implementation of security policies, procedures, and controls (i.e., demonstrates progress in implementation efforts).
213. Which of the following is a prerequisite to IT security training?
a. Security basics
b. Awareness
c. Security literacy
d. Education
214. The security objective or principle of integrity does
a. Accuracy
b. Privacy
c. Non-repudiation
d. Accountability
Integrity is the property that protected and sensitive data has not been modified or deleted in an unauthorized and undetected manner. Accuracy is a qualitative assessment of correctness of data or freedom from error (i.e., data needs integrity). Non-repudiation is a service that is used to provide assurance of the integrity and origin of data in such a way that the integrity and origin can be verified and validated by a third party. Accountability generates the requirements for actions of an individual to be traced uniquely to that individual (i.e., supports prevention, detection, fault isolation, and non-repudiation). Hence, accuracy, accountability, and non-repudiation all require that data and information must have integrity. If data that an individual is handling is not accurate and if an individual can deny sending or receiving a message, how can that individual be held accountable for his actions? Note that the terms integrity, accuracy, non-repudiation, and accountability have different definitions and meanings depending on the context of use.
215. Which of the following verifies that the other three security principles have been adequately met by a specific implementation?
a. Assurance
b. Integrity
c. Confidentiality
d. Availability
216. Regarding information security governance, which of the following should take place for noncompliance?
a. Change in policies
b. Change in procedures
c. Change in practices
d. Periodic assessments
217. Which of the following must be considered when the system boundaries are drawn and when establishing a control baseline?
a. Confidentiality
b. Impact levels
c. Integrity
d. Availability
218. Which of the following is
a. Reproducibility
b. Utility
c. Integrity
d. Objectivity