Question

is/are an example of a detective control. 7) A) Physical access controls B) Encryption C) Emergency response teanms D) Log an
0 0
Add a comment Improve this question Transcribed image text
Answer #1

7. Solution: The correct option is “D” i.e Log Analysis

Log Analysis is a detective control which is aimed at unearthing evidences for the mischief that has occurred. Log Analysis is used to identify possible attacks and unauthorised access into the system.

8. Solution: The correct option is “C” i.e. Continuous monitoring. COBIT 5 management practice APO01.08 stresses the importance of Continuous monitoring of both employee compliance with the organisation’s information security policies and overall performance of businesses processes

9. Solution: The correct option is “B” i.e Passwords should be no more than 8 characteristics in length. This is not a requirement for effective and strong passwords. Passwords should have minimum 8 characters consisting of a mix of uppaer case and lower case characters that should be changed at regular intervals and should not be words picked from dictionary.

10. Solution: The correct option is “D” i.e i.e Encryption: this is done in order to raise the awareness regarding the theft of data.

Add a comment
Know the answer?
Add Answer to:
is/are an example of a detective control. 7) A) Physical access controls B) Encryption C) Emergency...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 14) The process that screens individual IP packets based solely on the contents of the source...

    14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as A) access control list. B) deep packet inspection. C) intrusion filtering. D) packet filtering. 15) The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as A) deep packet inspection. B) stateful packet filtering. C) static...

  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • Choose the best answer (one) and give reason in a few sentences for your choice or...

    Choose the best answer (one) and give reason in a few sentences for your choice or not choosing others. Please give a reference. To get the full credit, the reason should be in your own words, not a copy from a reference/internet source. Such a copy will be considered plagiarizing Q2. (4 pts) Which of the following is an example of a comprehensive security strategy? ______ A. We already use encryption, so we are safe. B. We can detect intrusions...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • 8. Which of the following is true about firewalls and their ability to adapt in a...

    8. Which of the following is true about firewalls and their ability to adapt in a network? a. Firewalls can interpret human actions and make decisions outside their programming. b. Because firewalls are not programmed like a computer, they are less error prone s. Firewalls are flexible and can adapt to new threats aFirewalls deal strictly with defined patterns of measured observation 9 Which of the following is a reason organization use intrusion detection system? To collect data. To deter...

  • Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test....

    Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the...

  • 1)An effective and robust system of internal control ________. A) should be carefully examined to see...

    1)An effective and robust system of internal control ________. A) should be carefully examined to see if the benefits outweigh the costs of providing such a system B) will eliminate all risks related to entity objectives C) will guarantee that the entity will meet its objectives D) can only provide an entity with reasonable assurance in achieving its financial reporting objectives 2) Physical controls are concerned with limiting ________. A) the informational output of the firm B) access to accounting...

  • (PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD...

    (PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD OR WHITE BOARD) Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for...

  • 1-In which type of incident does a person or program, acting on behalf of another person,...

    1-In which type of incident does a person or program, acting on behalf of another person, perform an invalid action? a) Repudiation   b)Identity theft c)Subversion 2-What type of incident forces the victim to pay money to the attacker by threatening to reveal information that could lead to a severe loss for the victim? a) extortion b)harassment c)overpowering 3- Which incident-prevention strategy might involve the review of Internet Security and Acceleration (ISA) Server logs? a)defense-in-depth b)auditing c)scanning   d)detecting intrusions 4-Which of...

  • Malicious users utilized brute force to access a system. A cyber security analyst is investigating these...

    Malicious users utilized brute force to access a system. A cyber security analyst is investigating these attacks and recommends methods to management that would help secure the system. Which of the following controls should the analyst recommend? (Choose three.) A. Multifactor authentication B. Network segmentation C. Single sign-on D. Encryption E. Complexity policy F. Biometrics G. Obfuscation --------------------------------------------------------------------------------------------------------- A cyber security analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT