Exam 2: Security Policies and Standards

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -Informal part of an organization's culture.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

G

Match each item with a statement below. -Ensures that critical business functions continue if a catastrophic incident or disaster occurs.

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

D

An attack scenario end case is categorized ____.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

The details of the allowable use of company-owned networks and the Internet would most likely be covered in the enterprise information security policy.

(True/False)
4.9/5
(42)

Policies are put in place to support the organization's mission, vision, and strategic planning.

(True/False)
4.7/5
(32)

____________________ management differs dramatically from incident response, as it focuses first and foremost on the people involved.

(Short Answer)
4.8/5
(35)

Attack profiles should include scenarios depicting a typical attack, with details on the method, the indicators, and the broad consequences of the attack.

(True/False)
4.8/5
(39)

Within the IETF, the Security Area Working Group acts as an advisory board for security topics that affect the various Internet-related protocols.

(True/False)
4.9/5
(38)

Explain the difference between a policy and a standard.

(Essay)
4.9/5
(36)

Match each item with a statement below. -Set of rules for the protection of an organization's information assets.

(Multiple Choice)
5.0/5
(33)

Explain how access control lists might be implemented.

(Essay)
4.8/5
(29)

A security framework specifies the tasks for deploying security tools in the order in which they are to be accomplished.

(True/False)
4.8/5
(29)

Match each item with a statement below. -The set of activities taken to plan for, detect, and correct the impact of an incident on information assets.

(Multiple Choice)
4.8/5
(32)

What are spheres of security? Provide examples illustrating the different components.

(Essay)
4.8/5
(35)

A(n) ____________________ is also known as a general security policy, an IT security policy, or an information security policy.

(Short Answer)
4.9/5
(41)

Explain what might happen if managerial guidance SysSP documents have not been written or provided to technical staff.

(Essay)
4.8/5
(38)

A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.

(Multiple Choice)
4.7/5
(46)

The first phase in the development of the contingency planning process is the ____.

(Multiple Choice)
4.8/5
(33)

RFC 2196: Site Security Handbook is produced by ____.

(Multiple Choice)
4.9/5
(39)

The ____ is created by a systems administer to direct practices with many details.

(Multiple Choice)
5.0/5
(27)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)