Process of Planning Organizing Directing and Controlling Monetary Activities
Process of Planning Organizing Directing and Controlling Monetary Activities MCQs
1) The process of planning, organizing, directing and controlling the monetary activities of an organization and the use of its funds is known as:
Management Accounting
Budgeting
Financial management
None of the listed choices
2) The measurement of the rate at which the cash flows out of the business is known as:
Budgeting
Expense charting
Cost management
Burn rate
3) To determine the value of information and assets if impacted by a breach of security or data loss you would conduct a:
Risk assessment
Business Impact assessment
Profit/loss analysis
None of the listed choices are correct
4) Alternate processing sites that allows the restoration of systems to an alternate processing site constitute a common strategy that supports_______
Disaster recovery planning
Supply chain continuity
Recovery point objective
Business continuity management
5) _______is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets such as buildings, equipment, or new business.
Capital Expenditure
The annual budget
Operating Expenditure
Liabilities
6) During the time that IT operations of the cybersecurity program in recovery mode, the organization must continue to provide critical business functions, this is known as:
Disaster Recovery Planning
Business continuity management
Recovery point objective
Supply chain continuity
7) Which is the most important phase of the digital forensic investigation process?
Evidence collection
Evidence analysis
Investigation reporting
Evidence examination
8) What defines the response priority for a security incident within the context of other events and incidents the security operations team is managing?
Business impact
Security guidelines
Security frameworks
Regulations
9) The overall design of an information security program, depicting its structural components, interrelationships and design principles and guideline, is _______
A framework
A process maps
A network diagrams
An architecture
10) Money for ongoing costs related to running a product business, or systems is known as:
Capital expenditure
Liabilities
The annual budget
Operating expenditure
11)Which of the following is not a proactive approach to security?
Threat hunting
Vulnerability scanning
Event management
Penetrating Testing
12) The most important aspect of internal incident communication is to:
Reduce stress related to the incident
None of the listed choices are correct
Reinforce policies and standards for external communication
Keep personnel informed
13) When preparing a Disaster Recovery Plan there are several alternate recovery site configurations available for the CISO to select from, which of the following are ranked in order from the fastest to slowest to begin processing with?
Hot site, redundant site, warm site
Hot site, warm site, redundant site
Warm site, redundant site, hot site
Redundant site, hot site, warm site
14) What formally creates a project?
Creating a project charter
Project feasibility assessment
Project execution
Project planning
15) Incident______ forms the basis of an organization’s ability to respond effectively to computer security incidents.
Analysis
Containment
Response
Recovery
16) Business Impact Analysis (BIA) determines your company has a process with Recovery Point Object (RPO) of 10 minutes and has a Recovery Time Objective (RTO) of 2 minutes. This requires a backup schedule of ___?
12 minuets
2 minutes
8 minutes
10 minutes
17) A CISO would use this to extend the capability of a SIEM for a specific purpose or to identify a specific outcome:
Normalization
Use case
DNS logs
Correlation
18) For the CISO, the security budget measures what?
The exchange of financial allocations for the security products and services supporting the organizations.
The degree of controls that can be implemented
The maximum amount of money the CISO has to work with
The effectiveness of the information security program.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
