Exam 4: Information Security Policy
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
A(n)____ security policy provides detailed,targeted guidance to instruct all members of the organization in the use of technology-based systems.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
The champion and manager of the information security policy is called the ____________________.
Free
(Short Answer)
4.7/5
(35)
Correct Answer:
policy administrator
During the implementation phase of the policy development SecSDLC,the development team creating the information security policy should make sure that the policy is written at a reasonable reading level._________________________
(True/False)
4.8/5
(40)
A disadvantage of creating a modular ISSP document is that it ____.
(Multiple Choice)
4.9/5
(30)
It is recommended that the ____ approach(es)to creating and managing ISSPs be used.
(Multiple Choice)
4.7/5
(31)
Unless a particular use is clearly prohibited,the organization cannot penalize employees for it.
(True/False)
4.8/5
(32)
An effective issue-specific security policy serves to demonstrate that the organization has made a good-faith effort to ensure that its facilities will not be used in an inappropriate manner._________________________
(True/False)
4.8/5
(35)
In the Flesch Reading Ease scale,the higher the score,the harder it is to understand the writing.
(True/False)
4.8/5
(39)
Many organizations create a single document that combines elements of both the management guidance SysSP and the technical specifications SysSP,known as a(n)____.
(Multiple Choice)
4.9/5
(30)
The EISP guides the development,implementation,and management requirements of the information security program._________________________
(True/False)
4.8/5
(35)
The ____ model describes the layers at which marginal assessment of security controls can be performed and is a proven mechanism for prioritizing complex changes.
(Multiple Choice)
4.8/5
(28)
The ____________________ phase is the last phase of the SecSDLC.
(Short Answer)
4.7/5
(36)
All the application systems of an organization are part of the ____________________ layer in the bull's-eye model.
(Short Answer)
4.8/5
(26)
Rule-based policies are less specific to the operation of a system than access control lists.
(True/False)
4.9/5
(26)
Which of the following sections of the ISSP should provide instructions on how to report observed or suspected violations?
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)