Administrative controls include personnel practices, assignment of responsibilities, and supervision and are part of management controls. Operational controls are the day-to-day procedures and mechanisms used to protect operational systems and applications. Operational controls affect the system and application environment. Technical controls are hardware and software controls used to provide automated protection for the IT system or application. Technical controls operate within the technical system and applications.
126. A successful incident handling capability should serve which of the following?
a. Internal users only
b. All computer platforms
c. All business units
d. Both internal and external users
127. Which of the following encourages compliance with IT security policies?
a. Use
b. Results
c. Monitoring
d. Reporting
128. Who should measure the effectiveness of security-related controls in an organization?
a. Local security specialist
b. Business manager
c. Systems auditor
d. Central security manager
129. Which of the following corrects faults and returns a system to operation in the event a system component fails?
a. Preventive maintenance
b. Remedial maintenance
c. Hardware maintenance
d. Software maintenance
130. Which of the following statements is
a. There is interdependency between audit trails and security policy.
b. If a user is impersonated, the audit trail establishes events and the identity of the user.
c. Audit trails can assist in contingency planning.
d. Audit trails can be used to identify breakdowns in logical access controls.
It is true that there is interdependency between audit trails and security policy. Policy dictates who has authorized access to particular system resources. Therefore it specifies, directly or indirectly, what violations of policy should be identified through audit trails.
It is true that audit trails can assist in contingency planning by leaving a record of activities performed on the system or within a specific application. In the event of a technical malfunction, this log can be used to help reconstruct the state of the system (or specific files).
It is true that audit trails can be used to identify breakdowns in logical access controls. Logical access controls restrict the use of system resources to authorized users. Audit trails complement this activity by identifying breakdowns in logical access controls or verifying that access control restrictions are behaving as expected.
131. Which of the following is a policy-driven storage media?
a. Hierarchical storage management
b. Tape management
c. Direct access storage device
d. Optical disk platters