0
[{"id":53427,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:50:03","updated_at":"2016-04-12 01:16:20","questionName":"Provide independent assurance to the management on the appropriateness of the security controls. Examines the information system and determines if it is designed, configured, implemented, operated and management in a way ensuring that the organizational objectives are being achieved.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53432,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:03:34","updated_at":"2016-04-12 01:16:20","questionName":"Manage the installation, maintenance and ongoing operation of surveillance systems, alarm systems, card reader access control systems. Act as a deterrent to unauthorized access and provide for employee safety.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53424,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:40:51","updated_at":"2016-04-12 01:16:20","questionName":"Responsible for drafting security policies, standards, and supporting guidelines, procedures, and baselines. Provides guidance for technical security issues, emerging threats, interpretation of regulations and industry trends.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53435,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:11:10","updated_at":"2016-04-12 01:16:20","questionName":"Often the first indicators of security issues or incidents and responsible for contacting the computer security incident response team (CIRT) when a situation meets certain criteria.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53433,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:06:15","updated_at":"2016-04-12 01:16:20","questionName":"Helps develop and set baselines, policies, standards, and guidelines by defining security program elements and ensures they are carried out and practiced properly.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53426,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:47:01","updated_at":"2016-04-12 01:16:20","questionName":"Ensure that the information is available to the end users and backed up. Information may be stored in files, databases, or systems and requires access rights to the information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53431,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:00:33","updated_at":"2016-04-12 01:16:20","questionName":"Configures and maintains hardware and OS to ensure that the information is available and accessible.Also responsible for patch management and software distribution. Tests and implements system upgrades, provides vulnerability management and mitigates vulnerabilities.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53434,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:09:01","updated_at":"2016-04-12 01:16:20","questionName":"Serves as the first person to interact with outsiders to minimize the risk of divulging useful company information or providing unauthorized physical access","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53419,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:34:28","updated_at":"2016-04-12 01:16:20","questionName":"Protects information assets on a daily basis through adherence to the security policies that have been communicated.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53425,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:43:50","updated_at":"2016-04-12 01:16:20","questionName":"Assign appropriate classification to information assets, ensure the business information is protected by certain controls, review classification and access rights. Also determines criticality, sensitivity, retention, backups, and safeguards.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53428,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:52:11","updated_at":"2016-04-12 01:16:20","questionName":"Develop contingency plans to prepare for anything that could have the ability to impact the company's objectives negatively.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53429,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:54:41","updated_at":"2016-04-12 01:16:20","questionName":"Responsible for designing security controls into information systems, testing the controls, and implementing the systems in production environments. Also work with business owners and security professionals to ensure designed solutions provide security controls commensurate with requirements.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53423,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:38:24","updated_at":"2016-04-12 01:16:20","questionName":"Directs, coordinates, plans and organizes information security activities throughout the organization. Also responsible for the design, implementation, management, and review of the organization's security policies, standards, procedures, baselines and guidelines.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53430,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:57:40","updated_at":"2016-04-12 01:16:20","questionName":"Manages user access request process and ensures that privileges are provided to those individuals who have been authorized for access. Move, Add, Change user accounts and add or remove privileges as necessary. Also maintains records of access request approvals and produces reports to demonstrate compliance with policiies.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53421,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:35:49","updated_at":"2016-04-12 01:16:20","questionName":"Maintains overall responsibility for protection of the information assets.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]