Posts : 638
Points : 2155
Reputation : 19
Join date : 2010-05-15
Age : 29
Location : islamabad
|Subject: CS507 QUIZ Thu Jul 22, 2010 9:20 pm|| |
or members of a company in need of information is called
Risk Management is the process of measuring, or assessing risk and then developing
strategies to manage the risk.
Question # 3 of 10 ( Start time: 05:21:48 PM ) Total Marks: 1
Logical Threat For example the virus or bug being installed to corrupt data
or software might create BAD SECTORS on the hard drive, leading to its preferable
removal from the computer.
“Different levels and types of security may be required to address the risks to
information. Security levels and associated costs must be compatible with the value
of the information.”
There are typically two kinds of audit records: (1) An event-oriented log (2) A record
of every keystroke
Question # 6 of 10 ( Start time: 05:25:04 PM ) Total Marks: 1
Access controls focus on the correct identification of the user seeking permission to
access the system. There can be various sources of identifying and authenticating
Question # 7 of 10 ( Start time: 05:26:11 PM ) Total Marks: 1
Implementation of controls is a critical security feature of information systems
In risk management a corporate level facilitator perform
the overall risk assessment process and reviewing results of risk assessments in the
hardware and software systems from the perspective of offering a better, reliable and
risk free product.
Question # 9 of 10 ( Start time: 05:29:21 PM ) Total Marks: 1
Information technology infrastructure
Option a and b both
An information technology (IT) audit or information systems (IS) audit is an
examination of the controls within an entity's Information technology infrastructure.