Podcast
Questions and Answers
What should be done with the use of utility programs capable of overriding system and application controls?
What should be done with the use of utility programs capable of overriding system and application controls?
- They should be freely accessible to all users
- They should have no restrictions at all
- They should be tightly controlled and restricted (correct)
- They should only be controlled for system controls
In the context of information security requirements for developing or acquiring applications, what should be done?
In the context of information security requirements for developing or acquiring applications, what should be done?
- Allow unrestricted access to information security requirements
- Ignore the information security requirements
- Identify, specify, and approve information security requirements (correct)
- Avoid specifying and approving information security requirements
What should be established and applied for the secure development of software and systems?
What should be established and applied for the secure development of software and systems?
- Rules for hardware development only
- Rules for the secure development of software and systems (correct)
- No rules are necessary for secure development
- Rules for insecure development of software and systems
What is the purpose of cabling security?
What is the purpose of cabling security?
What is the primary concern when disposing of equipment containing storage media?
What is the primary concern when disposing of equipment containing storage media?
What is the key requirement for protecting information stored on user end point devices?
What is the key requirement for protecting information stored on user end point devices?
What should be done to prevent data leakage from systems, networks, and other devices processing sensitive information?
What should be done to prevent data leakage from systems, networks, and other devices processing sensitive information?
What is the requirement for maintaining and testing backup copies of information, software, and systems?
What is the requirement for maintaining and testing backup copies of information, software, and systems?
What is the purpose of monitoring networks, systems, and applications for anomalous behavior?
What is the purpose of monitoring networks, systems, and applications for anomalous behavior?
What procedures and measures should be implemented to manage software installation on operational systems?
What procedures and measures should be implemented to manage software installation on operational systems?