Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ security policy provides detailed,targeted guidance to instruct all members of the organization in the use of technology-based systems.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

Technical controls ____.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

The champion and manager of the information security policy is called the ____________________.

Free
(Short Answer)
4.7/5
(35)
Correct Answer:
Verified

policy administrator

During the implementation phase of the policy development SecSDLC,the development team creating the information security policy should make sure that the policy is written at a reasonable reading level._________________________

(True/False)
4.8/5
(40)

A disadvantage of creating a modular ISSP document is that it ____.

(Multiple Choice)
4.9/5
(30)

It is recommended that the ____ approach(es)to creating and managing ISSPs be used.

(Multiple Choice)
4.7/5
(31)

Once policies are created,they should not be changed.

(True/False)
4.7/5
(39)

Unless a particular use is clearly prohibited,the organization cannot penalize employees for it.

(True/False)
4.8/5
(32)

The ISSP should begin with a ____.

(Multiple Choice)
4.8/5
(32)

An effective issue-specific security policy serves to demonstrate that the organization has made a good-faith effort to ensure that its facilities will not be used in an inappropriate manner._________________________

(True/False)
4.8/5
(35)

In the Flesch Reading Ease scale,the higher the score,the harder it is to understand the writing.

(True/False)
4.8/5
(39)

Many organizations create a single document that combines elements of both the management guidance SysSP and the technical specifications SysSP,known as a(n)____.

(Multiple Choice)
4.9/5
(30)

The EISP guides the development,implementation,and management requirements of the information security program._________________________

(True/False)
4.8/5
(35)

The ____ model describes the layers at which marginal assessment of security controls can be performed and is a proven mechanism for prioritizing complex changes.

(Multiple Choice)
4.8/5
(28)

The ____________________ phase is the last phase of the SecSDLC.

(Short Answer)
4.7/5
(36)

All the application systems of an organization are part of the ____________________ layer in the bull's-eye model.

(Short Answer)
4.8/5
(26)

Capability tables are also known as ____.

(Multiple Choice)
4.7/5
(35)

Policies should be published without a date of origin.

(True/False)
4.8/5
(33)

Rule-based policies are less specific to the operation of a system than access control lists.

(True/False)
4.9/5
(26)

Which of the following sections of the ISSP should provide instructions on how to report observed or suspected violations?

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)