219. Which of the following information security governance structures provides the creation of interorganizational and intra-organizational communication mechanisms in establishing the appropriate policies, procedures, and processes dealing with risk management and information security strategies?
a. Centralized governance
b. Decentralized governance
c. Hybrid governance
d. Virtual governance
Decentralized governance is the opposite of the centralized governance, hybrid governance is a combination of centralized and decentralized governance, and virtual governance does not and should not exist.
220. Which of the following outcomes of information security governance, a part of information technology (IT) governance, relates to investments in risk management?
a. Strategic alignment
b. Risk management processes
c. Risk management resources
d. Delivered value
Strategic alignment means risk management decisions made in business functions should be consistent with organizational goals and objectives. Risk management processes frame, assess, respond to, and monitor risk to organizational operations and assets, individuals, and other organizations. Risk management resources deal with effective and efficient allocation of given resources.
221. Which of the following information security governance structures establish the appropriate policies, procedures, and processes dealing with risk management and information security strategies at the cost of consistency throughout the organization as a whole?
a. Centralized governance
b. Decentralized governance
c. Hybrid governance
d. Virtual governance
Centralized governance is the opposite of the decentralized governance, hybrid governance is a combination of centralized and decentralized governance, and virtual governance does not and should not exist.
222. Which of the following is
a. Use of unauthorized software
b. Operational security rules
c. Acquisition of software
d. Doing computer work at home
223. Which of the following IT security metrics focuses on effectiveness?
a. Average frequency of audit records reviewed and analyzed for inappropriate activity
b. Percentage of security incidents caused by improperly configured access controls
c. Percentage of audit log findings reported to appropriate officials
d. Percentage of systems using automated mechanisms to conduct analysis and reporting of inappropriate activities