Exam 2: Security Policies and Standards

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the benefits of a security newsletter.

(Essay)
4.9/5
(32)

What topics might an ISSP cover?

(Essay)
4.7/5
(34)

A security ____ is an outline of the overall information security strategy and a roadmap for planned changes to the organization's information security environment.

(Multiple Choice)
4.7/5
(29)

The ____ illustrates the ways in which people access information.

(Multiple Choice)
4.7/5
(37)

What criteria must a policy meet to be considered effective and legally enforceable?

(Essay)
4.9/5
(36)

Match each item with a statement below. -Investigation and assessment of the impact that various attacks can have on the organization.

(Multiple Choice)
4.8/5
(35)

The identification of critical business functions and the resources needed to support them is the cornerstone of the ____________________ plan.

(Short Answer)
4.9/5
(24)

Match each item with a statement below. -Created by management to guide the implementation and configuration of a specific technology so as to direct the way a technology is to be used to control the behavior of people in the organization.

(Multiple Choice)
4.8/5
(40)

____ planning prepares an organization to reestablish critical business operations during a disaster that affects operations at the primary site.

(Multiple Choice)
4.8/5
(37)

A(n) ____________________ is a set of specifications that identifies a piece of technology's authorized users and includes details on the rights and privileges those users have on that technology.

(Short Answer)
4.8/5
(41)

How does an EISP address an organization's need to comply with laws and regulations?

(Essay)
4.8/5
(40)

Match each item with a statement below. -Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely.

(Multiple Choice)
4.9/5
(31)

Practices, procedures, and guidelines effectively explain how to comply with ____.

(Multiple Choice)
4.9/5
(28)

A(n) ____ is detailed description of the activities that occur during an attack.

(Multiple Choice)
4.9/5
(39)

The analysis and prioritization of the business functions within the organization's departments, sections, divisions, groups, or other units to determine which are most vital to continued operations is called ____.

(Multiple Choice)
5.0/5
(23)

The ____ of an organization is a written statement of its purpose.

(Multiple Choice)
4.8/5
(31)

Establishing a contact number of hot line is an aspect of ____ planning.

(Multiple Choice)
4.8/5
(37)

Match each item with a statement below. -Published, scrutinized, and ratified by a group.

(Multiple Choice)
4.8/5
(32)

____ are the specific instructions entered into a security system to regulate how it reacts to the data it receives.

(Multiple Choice)
4.8/5
(25)

A(n) ____ plan addresses the identification, classification, response, and recovery from an incident.

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)