- Module 4: Security Architecture and
Tool Sets
Which framework was designed to widen the focus of an organization to overall
architecture?
COBIT
TOGAF
SABSA
ITIL Correct answer- TOGAF (The Open Group Architecture Framework)
The procedures in place to test controls need to be examined only by internal parties to
ensure security.
True
False Correct answer- False
Which policies are responsible for securing employee profiles?
Account Management Policy
Acceptable Use Policy
Data Ownership Policy
Password Policy Correct answer- Account Management Policy & Password Policy
Which type of control would a software in charge of managing who has access to the
network be?
Administrative Control
Defined Parameters
Logical Control
Physical Control Correct answer- Logical Control
Audits should be done by a third party to get a more accurate result.
True
False Correct answer- True
What type of verification method is based on a judgement call?
Assessments
, Audit
Evaluation
Certification Correct answer- Evaluation
Which framework is distinguished by focusing exclusively on IT security?
NIST
TOGAF
ISO
ITIL Correct answer- NIST (National Institute of Standards and Technology)
What procedure is responsible for supplementing a lack of controls?
Patching
Managing Exceptions
Control Testing Procedures
Compensation Control Development Correct answer- Compensation Control
Development
Which policy might govern how guests may use the companies WiFi?
Data Retention Policy
Account Management Policy
Acceptable Use Policy
Data Ownership Policy Correct answer- Acceptable Use Policy
A guideline is an adamant step by step listing of actions to be completed for a given
task.
True
False Correct answer- False
In which procedure is everyone in the company told how to react and alert proper
members of staff?
Evidence Production
Continuous Monitoring
Remediation Plans
Managing Exceptions Correct answer- Evidence Production
Which framework is distinguished by providing information assurance and is driven by
risk analysis?
TOGAF
ITIL
NIST