Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____________________,which is usually presented on a screen to the user during software installation,spells out fair and responsible use of the software being installed.

(Short Answer)
4.8/5
(40)

The policy administrator must be identified on the policy document as the primary contact for providing additional information or suggesting revisions to the policy._________________________

(True/False)
4.9/5
(33)

A(n)blow-by screen is an organizational tool to ensure that all the appropriate information security policy messages are presented to all the appropriate audiences._________________________

(True/False)
4.9/5
(43)

For instance,if policy mandates that all employees wear identification badges in a clearly visible location,and select members of management decide they are not required to follow this policy,any actions taken against other employees will ____.

(Multiple Choice)
4.9/5
(37)

To execute a policy,an organization must implement a set of ____________________ that clarify and define the policy.

(Short Answer)
4.8/5
(42)

Access control lists include user access lists,matrices,and capability tables._________________________

(True/False)
4.7/5
(44)

____________________ servers take organization-specific policies and code them in a special machine-readable language.

(Short Answer)
4.9/5
(25)

The ____________________ section of the ISSP should provide instructions to employees on how to report observed or suspected breaches of the usage and systems management policies.

(Short Answer)
4.8/5
(39)

The ____ section of the ISSP should specify users' and systems administrators' responsibilities.

(Multiple Choice)
4.7/5
(36)

The two groups of SysSPs are managerial guidance and ____.

(Multiple Choice)
4.8/5
(37)

During the ____ phase,the information security policy development team must provide for policy distribution.

(Multiple Choice)
5.0/5
(40)

A(n)issue-specific security policy sets the strategic direction,scope,and tone for all of an organization's security efforts._________________________

(True/False)
4.8/5
(37)

An ISSP will typically not cover the use of e-mail or the Internet.

(True/False)
4.9/5
(51)

The formulation of program policy in the ____________________ document establishes the overall information security environment.

(Short Answer)
4.8/5
(47)

The ____ section of an ISSP explains who can use the technology governed by the policy and for what purposes.

(Multiple Choice)
4.7/5
(31)

SysSPs focus on the proper handling of issues in the organization,like the use of technologies.

(True/False)
4.9/5
(34)

For most corporate documents,a score of ____ is preferred on the Flesch Reading Ease scale.

(Multiple Choice)
4.8/5
(40)

A(n)technical specifications SysSP document is created by management to guide the implementation and configuration of technology._________________________

(True/False)
4.8/5
(43)

An automated policy management system is able to assess readers' understanding of the policy and electronically record reader acknowledgments.

(True/False)
4.8/5
(37)

SysSPs often function as standards or procedures to be used when configuring or maintaining systems.

(True/False)
5.0/5
(29)
Showing 61 - 80 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)