Module 8 - Review Questions Answered--Version 7-1

docx

School

Collin County Community College District *

*We aren’t endorsed by this school

Course

2341

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

1

Uploaded by DeaconTurkey1941

Report
Module 8 - Current State and Security Frameworks Part 1 Review Questions 1. Define the following terms: a. GAP Analysis—Slide 70 b. Information Security Framework—Slide 100 2. What is the difference between Objectives and Outcomes? Slide 4 3. What are the six outcomes of an effective information security governance program? Slide 5 4. What are the questions that must be asked in regards to the six outcomes of an effective information security governance program? Slide 7-8 5. What is a common approach to create practical points of reference to gauge the extent to which these outcomes will be realized? Slide 9 6. What are the Key Goal Indicators (KGI) for Strategic Alignment? Slides 11 7. What are the Key Goal Indicators (KGI) for Risk Management? Slide 18-19 8. What are the Key Goal Indicators (KGI) for Business Process Assurance/Convergence? Slides 22 9. What are the Key Goal Indicators (KGI) for Value Delivery? Slides 25-26 10. What are the Key Goal Indicators (KGI) for Resource Management? Slides 28 11. What are the Key Goal Indicators (KGI) for Performance Management? Slide 30 12. What can one use to describe the current state? Slide 34 or GAP Assessment 13. What in general terms is the Risk Management Framework? Slide 49 14. What five main categories are included in the NIST Cyber Security Framework? Slide 55 15. What is the Cybersecurity Maturity Model Certification (CMMC) Framework? Slide 60 16. What is used in determining what is required between current state and desired state? GAP Assessment/Analysis, Slide 67 and 70 17. Why do a GAP Analysis? Slide 71 18. What are the major steps/activities in performing a GAP Assessment/Analysis? Slides 72-73 19. What are some sources one can use in performing a GAP Analysis? Slides 79-96 20. What are the four components to an Information Security Framework? Slide 101 21. What are some considerations for Information Security Framework Selection? Slide 107 22. What tool is used and identified in determining Information Security Framework role assignments? Slide 105 23. What are some sources for Information Security Framework selection process? Slide 102
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help