Corporate Computer Security, 5e (Boyle/Panko)
Chapter 2 Planning and Policy
1) Which of the following is FALSE about security management?
A) Management is abstract; technology is visible.
B) Security technology is far more important than security management.
C) There are fewer general principles in security management than technology.
D) It is generally a mistake to focus too heavily on security technology compared to security
management.
Answer: B
Page Ref: 49
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Difficult
2) Comprehensive security pertains to ________.
A) closing all routes of attack to their systems to attackers
B) closing all Internet-linked servers to attackers
C) lessening security issues in an entire company
D) decreasing the risk of all computer systems in a company
Answer: A
Page Ref: 49
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Moderate
3) If a failure of a single element of a system will ruin security, this is called a(n) ________.
A) weakest-link failure
B) hybrid solution
C) internal audit
D) risk analysis
Answer: A
Page Ref: 49
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Easy
4) Process pertains to ________.
A) the plan-protect-respond cycle
B) the systems life cycle
C) a planned series of actions
D) recovery according to plan
Answer: C
Page Ref: 50
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Moderate
1
Copyright © 2021 Pearson Education, Inc.
mynursytest.store
,DOWNLOAD THE Test Bank for Corporate Computer Security 5th Edition Boyl
5) Which of the following is NOT part of the highest-level security management process that
most firms use today to protect against threats?
A) Plan
B) Process
C) Protect
D) Respond
Answer: B
Page Ref: 51
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Moderate
6) The systems development life cycle is most connected to the ________ of the plan-protect-
respond cycle of security management.
A) plan
B) process
C) protect
D) respond
Answer: C
Page Ref: 52
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Moderate
7) Response is ________.
A) the second phase of the systems life cycle
B) the plan-based creation and operation of countermeasures
C) a planned series of actions
D) recovery according to plan
Answer: D
Page Ref: 53
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Moderate
8) A firm's primary objective is to make a profit.
Answer: TRUE
Page Ref: 48
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Easy
9) A firewall administrator should check the log file in a company each week.
Answer: FALSE
Page Ref: 49
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Moderate
2
Copyright © 2021 Pearson Education, Inc.
mynursytest.store
, DOWNLOAD THE Test Bank for Corporate Computer Security 5th Edition Boyl
10) One reason why security management is difficult is that companies need to protect a large
number of resources.
Answer: TRUE
Page Ref: 50
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Easy
11) Security is too complicated to be managed informally.
Answer: TRUE
Page Ref: 50
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Easy
12) In the plan-protect-respond cycle, the three activities always take place in sequential order.
Answer: FALSE
Page Ref: 50
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Easy
13) One key to making security an enabler is to get security involved near the end of most
projects.
Answer: FALSE
Page Ref: 54
Learning Objective: 2.1 Justify the need for formal management processes
Difficulty: Easy
14) ________ are things that require a firm to change its security planning, protections, and
response.
A) Responses
B) Protections
C) MSSPs
D) Driving forces
Answer: D
Page Ref: 58
Learning Objective: 2.2 Describe compliance laws and regulations
Difficulty: Moderate
15) Which of the following produced the greatest change in financial reporting requirement since
the Great Depression?
A) The Sarbanes-Oxley Act
B) The General Data Protection Regulation
C) The Gramm-Leach-Bliley Act
D) The Health Insurance Portability and Accountability Act
Answer: A
Page Ref: 58
Learning Objective: 2.2 Describe compliance laws and regulations
Difficulty: Moderate
3
Copyright © 2021 Pearson Education, Inc.
mynursytest.store