Exam 4: Information Security Policy
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
A(n)____________________,which is usually presented on a screen to the user during software installation,spells out fair and responsible use of the software being installed.
(Short Answer)
4.8/5
(40)
The policy administrator must be identified on the policy document as the primary contact for providing additional information or suggesting revisions to the policy._________________________
(True/False)
4.9/5
(33)
A(n)blow-by screen is an organizational tool to ensure that all the appropriate information security policy messages are presented to all the appropriate audiences._________________________
(True/False)
4.9/5
(43)
For instance,if policy mandates that all employees wear identification badges in a clearly visible location,and select members of management decide they are not required to follow this policy,any actions taken against other employees will ____.
(Multiple Choice)
4.9/5
(37)
To execute a policy,an organization must implement a set of ____________________ that clarify and define the policy.
(Short Answer)
4.8/5
(42)
Access control lists include user access lists,matrices,and capability tables._________________________
(True/False)
4.7/5
(44)
____________________ servers take organization-specific policies and code them in a special machine-readable language.
(Short Answer)
4.9/5
(25)
The ____________________ section of the ISSP should provide instructions to employees on how to report observed or suspected breaches of the usage and systems management policies.
(Short Answer)
4.8/5
(39)
The ____ section of the ISSP should specify users' and systems administrators' responsibilities.
(Multiple Choice)
4.7/5
(36)
During the ____ phase,the information security policy development team must provide for policy distribution.
(Multiple Choice)
5.0/5
(40)
A(n)issue-specific security policy sets the strategic direction,scope,and tone for all of an organization's security efforts._________________________
(True/False)
4.8/5
(37)
An ISSP will typically not cover the use of e-mail or the Internet.
(True/False)
4.9/5
(51)
The formulation of program policy in the ____________________ document establishes the overall information security environment.
(Short Answer)
4.8/5
(47)
The ____ section of an ISSP explains who can use the technology governed by the policy and for what purposes.
(Multiple Choice)
4.7/5
(31)
SysSPs focus on the proper handling of issues in the organization,like the use of technologies.
(True/False)
4.9/5
(34)
For most corporate documents,a score of ____ is preferred on the Flesch Reading Ease scale.
(Multiple Choice)
4.8/5
(40)
A(n)technical specifications SysSP document is created by management to guide the implementation and configuration of technology._________________________
(True/False)
4.8/5
(43)
An automated policy management system is able to assess readers' understanding of the policy and electronically record reader acknowledgments.
(True/False)
4.8/5
(37)
SysSPs often function as standards or procedures to be used when configuring or maintaining systems.
(True/False)
5.0/5
(29)
Showing 61 - 80 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)