【正文】
A residual risk A 每時每刻 可信安全 49 Which of the following should be given technical security training? A Senior managers, functional managers and business unit managers B Security practitioners and information systems auditors C IT support personnel and system administrators D Operators C 每時每刻 可信安全 50 Related to information security, availability is the opposite of which of the following? A distribution B destruction C documentation D delegation B 每時每刻 可信安全 51 Which must bear the primary responsibility for determining the level of protection needed for information systems resources? A Seniors security analysts B systems auditors C Senior Management D IS security specialists C 每時每刻 可信安全 52 What would best define risk management? A The process of eliminating the risk B The process of reducing risk to an acceptable level C The process of assessing the risks D The process of transferring risk B 。s security policy? C 每時每刻 可信安全 32 In a properly segregated environment, which of the following tasks is patible with the task of security administrator? A Data entry B Systems programming C Quality assurance D Applications programming C 每時每刻 可信安全 33 The major objective of system configuration management is which of the following? A system maintenance B system tracking C system stability D system operations C 每時每刻 可信安全 34 In an anization, an Information Technology security function should: A Be independent but report to the Information Systems function. B Be lead by a Chief Security Officer and report directly to the CEO. C Report directly to a specialized business unit such as legal, corporate security or insurance. D Be a function within the information systems function of an anization. B 每時每刻 可信安全 35 Who should measure the effectiveness of security related controls in an anization? A the central security manager B the local security specialist C the systems auditor D the business manager C 每時每刻 可信安全 36 What is a difference between Quantitative and Qualitative Risk Analysis? A fully qualitative analysis is not possible, while quantitative is B quantitative provides formal cost/benefit analysis and qualitative not C there is no difference between qualitative and quantitative analysis D qualitative uses strong mathematical formulas and quantitative not B 每時每刻 可信安全 37 How is Annualized Loss Expectancy (ALE) derived from a treat? A ARO x (SLE EF) B SLE x ARO C SLE/EF D AV x EF B 每時每刻 可信安全 38 One purpose of a security awareness program is to modify: A attitudes of employees with sensitive data. B corporate attitudes about safeguarding data. C employee39。s information security policy? A Where is the anization39。每時每刻 可信安全 QUIZ 1 Which of the follow