( 48 ) Which of the following is not a key component that must be covered in an organization ’ s security policy for CIPA compliance ?
( 49 ) A popular social networking site recently changed its privacy policy regarding personal profiles . To prevent your profile information from being shared with anyone on the Internet , you must check a box requesting privacy . What is this an example of ?
( 50 ) Which of the following focuses on the payment card industry ?
CIS 462 Midterm Exam Set 2
• Question 1 Who is responsible for data quality within an enterprise ?
• Question 2 ___________ refers to the degree of risk an organization is willing to accept .
• Question 3 Which security policy framework , developed by CERT , focuses on information security assessment and planning ?
• Question 4 Which IT framework extends the COBIT framework and is a comprehensive risk management approach ?
• Question 5 Which security policy framework focuses on concepts , practices , and processes for managing and delivering IT services ?
• Question 6 The core requirement of an automated IT security control library is that the information is ________.
• Question 7 A fundamental component of internal control for high-risk transactions is __________.
• Question 8 An unauthorized user accessed protected network storage and viewed personnel records . What has been lost ?
• Question 9 During which phase of the COBIT ISS management life cycle do you review how you are going to manage your IT investment such as contracts , service level agreements ( SLAs ), and new policy ideas ?
• Question 10 Which of the following starts as an industry norm , and over time , becomes the measuring stick by which regulators judge organizations ?