Exam 11: Wireless Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The risks for the least important assets should be reduced first.

Free
(True/False)
4.7/5
(35)
Correct Answer:
Verified

False

____ is the process of tracking the assets.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

The proper development of a security policy is accomplished through what is called the ____.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

D

A ____ is a document that outlines specific requirements or rules that must be met.

(Multiple Choice)
4.8/5
(36)

The ALE is calculated by multiplying the SLE by the ____________________.

(Short Answer)
4.9/5
(34)

The ____ is the expected monetary loss every time a risk occurs.

(Multiple Choice)
4.8/5
(36)

If policies are too restrictive or too hard to implement and comply with, they will either be ignored or people will find a way to circumvent the controls in the policies.

(True/False)
4.8/5
(42)

The main purpose of an ethics code is to state the values, principles, and ideals that each member of an organization must agree to.

(True/False)
4.7/5
(43)

What are the options faced by an organization when confronted with a risk?

(Essay)
4.9/5
(39)

What are some of the principles that are involved for good compliance monitoring and evaluation?

(Essay)
4.9/5
(30)

Why is it critical to have users "buy in" to the policy and willingly follow it?

(Essay)
4.8/5
(35)

____ is defined as the obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them.

(Multiple Choice)
4.9/5
(43)

A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.

(Multiple Choice)
4.9/5
(37)

Briefly describe the areas that should be considered when creating an incident response team (IRT).

(Essay)
4.9/5
(34)

Many organizations now enforce a(n) ____ policy to address accessing public hotspots.

(Multiple Choice)
4.8/5
(28)

What are the layers of information security?

(Essay)
4.8/5
(32)

What are the three models of trust?

(Essay)
4.7/5
(33)

The SLE is computed by multiplying the value of the asset (Asset Value or AV) by the ____________________.

(Short Answer)
4.9/5
(40)
Match each item with an statement below:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
Exposure Factor (EF)
defines what actions the users of a system may perform while using the wireless network.
Attack tree
probability that a risk will occur in a particular year.
Acceptable use policy (AUP)
Correct Answer:
Verified
Premises:
Responses:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
Exposure Factor (EF)
defines what actions the users of a system may perform while using the wireless network.
Attack tree
probability that a risk will occur in a particular year.
Acceptable use policy (AUP)
final step in identifying risks.
Annualized Rate of Occurrence (ARO)
the lifeblood of an organization.
Security policy
encourage members of professional groups to adhere to strict ethical behavior within their profession.
Code of ethics
document that outlines the specific rules that must be met in order to keep the WLAN secure.
Risk assessment
a valuable tool used in threat modeling.
Data
proportion of an asset's value that is likely to be destroyed by a particular risk.
Security policy cycle
(Matching)
4.9/5
(39)

The best approach to creating a security policy is for a member of the IT staff to create the document in a few days with little or no input from other individuals.

(True/False)
4.9/5
(37)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)