Exam 2: Security Policies and Standards

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The document ____ provides a systems developmental lifecycle approach to security assessment of information systems.

(Multiple Choice)
4.8/5
(38)

The ____ plan typically focuses on restoring systems at the original site after disasters occur..

(Multiple Choice)
4.8/5
(35)

When disaster threatens the viability of the organization at the primary site, disaster recovery undergoes a transition into ____.

(Multiple Choice)
4.9/5
(35)

The document ____ makes recommendations for establishing firewall policies and for selecting, configuring, testing, deploying, and managing firewall solutions.

(Multiple Choice)
4.9/5
(27)

Match each item with a statement below. -Basis for the design, selection, and implementation of all security program elements, including policy implementation, ongoing policy management, risk management programs, education and training programs, technological controls, and maintenance of the security program.

(Multiple Choice)
4.8/5
(38)

Within a SETA program, ____ is only available to some of the organization's employees.

(Multiple Choice)
4.9/5
(29)

List the sections of the ISO/IEC 27002.

(Essay)
4.8/5
(35)

A security ____________________ is an outline of the overall information security strategy and a roadmap for planned changes to the organization's information security environment.

(Short Answer)
4.9/5
(39)

List and describe the four phases of incident response.

(Essay)
4.8/5
(41)

The ____ is an executive-level document, usually drafted by or at least in cooperation with the organization's chief information officer.

(Multiple Choice)
4.8/5
(35)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)