Exam 1: Understanding Cybersecurity Policy and Governance
Exam 1: Understanding Cybersecurity Policy and Governance20 Questions
Exam 2: Cybersecurity Policy Organization, Format, and Styles20 Questions
Exam 3: Cybersecurity Framework20 Questions
Exam 4: Governance and Risk Management20 Questions
Exam 5: Asset Management and Data Loss Prevention19 Questions
Exam 6: Human Resources Security20 Questions
Exam 7: Physical and Environmental Security19 Questions
Exam 8: Communications and Operations Security19 Questions
Exam 9: Access Control Management18 Questions
Exam 10: Information Systems Acquisition, Development, and Maintenance20 Questions
Exam 11: Cybersecurity Incident Response20 Questions
Exam 12: Business Continuity Management20 Questions
Exam 13: Regulatory Compliance for Financial Institutions20 Questions
Exam 14: Regulatory Compliance for the Health-Care Sector20 Questions
Exam 15: PCI Compliance for Merchants20 Questions
Exam 16: Nist Cybersecurity Framework20 Questions
Select questions type
Which of the following is another term for statutory law?
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
A
Which key task in the policy development phase requires the authors to consult with internal and external experts, including legal counsel, human resources, compliance, cybersecurity and technology professionals, auditors, and regulators?
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
C
Which of the following can be defined as the shared attitudes, goals, and practices that characterize a company, corporation, or institution?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
Which of the following federal legislations, also known as the Financial Modernization Act of 1999, was created to reform and modernize the banking industry by eliminating existing barriers between banking and commerce?
(Multiple Choice)
4.9/5
(30)
Which of the following is a collection of articles and amendments that provide a framework for the American government and define citizens' rights?
(Multiple Choice)
4.8/5
(30)
Which of the following elements ensures a policy is enforceable?
(Multiple Choice)
4.8/5
(44)
Which of the following is not one of the tasks of the policy development phase?
(Multiple Choice)
4.9/5
(34)
The United States Department of Homeland Security defines how many critical infrastructure sectors?
(Multiple Choice)
4.8/5
(39)
Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS devices, segmentation, and VLANs?
(Multiple Choice)
4.9/5
(36)
Which of the following is an example of an information asset?
(Multiple Choice)
4.9/5
(37)
Policy implementation and enforcement are part of which of the following phases of the cybersecurity policy life cycle?
(Multiple Choice)
4.8/5
(41)
Which major regulation entity within the European Union (EU) was created to maintain a single standard for data protection among all member states in the EU?
(Multiple Choice)
4.8/5
(44)
Which of the following is the correct order of the policy life cycle?
(Multiple Choice)
4.9/5
(35)
Endorsed is one of the seven policy characteristics. Which of the following statements best describes endorsed?
(Multiple Choice)
4.8/5
(45)
Which key task in the policy adoption phase is the busiest and most challenging task of all?
(Multiple Choice)
4.8/5
(38)
Which of the following is the seminal tool used to protect both our critical infrastructure and our individual liberties?
(Multiple Choice)
4.8/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)