Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In order to avoid reprisal or retaliation against employees,reporting of violations of policy should be set up to be ____________________ .

(Short Answer)
4.7/5
(28)

Configuration codes entered into security systems to guide the execution of the system when information is passing through it are called ____.

(Multiple Choice)
4.8/5
(47)

A disadvantage of creating a number of independent ISSP documents is that the result may ____.

(Multiple Choice)
4.9/5
(36)

Granularity is the level of specificity and detail with which administrators can control access to their systems._________________________

(True/False)
4.8/5
(29)

The policy administrator must be technically oriented.

(True/False)
4.8/5
(37)

The ISSP sections Authorized Access and Usage of Equipment and Prohibited Usage of Equipment may be combined into a section called ____.

(Multiple Choice)
4.8/5
(34)

A(n)standard is a more detailed statement of what must be done to comply with a policy._________________________

(True/False)
4.8/5
(30)

The ____ layer is the outermost layer of the bull's-eye model,hence the first to be assessed for marginal improvement.

(Multiple Choice)
4.8/5
(33)

Today,most EULAs are presented on blow-by screens.

(True/False)
4.9/5
(40)

Which of the following is a type of information security policy that deals with the entirety of an organization's information security efforts?

(Multiple Choice)
4.8/5
(35)

The responsibilities of both the users and the systems administrators with regard to specific technology rules should be specified in the ____________________ section of the ISSP.

(Short Answer)
4.9/5
(33)

If multiple audiences exist for information security policies,different documents must be created for each audience.

(True/False)
4.8/5
(38)

____ comprise a set of rules that dictates acceptable and unacceptable behavior within an organization.

(Multiple Choice)
4.9/5
(32)

The policy champion and manager is called the ____.

(Multiple Choice)
4.8/5
(43)

Which of the following is NOT a guideline that may help in the formulation of information technology (IT)policy as well as information security policy?

(Multiple Choice)
4.8/5
(42)

Unless a policy actually reaches the end users,it cannot be enforced.

(True/False)
4.9/5
(36)

A(n)enterprise information security policy is a type of information security policy that provides detailed,targeted guidance to instruct all members of the organization in the use of technology-based systems._________________________

(True/False)
4.8/5
(37)

A standard is built from a ____.

(Multiple Choice)
4.9/5
(31)

A disadvantage of creating a single comprehensive ISSP document is that such a document ____.

(Multiple Choice)
4.8/5
(34)

Which of the following is true about information security policy?

(Multiple Choice)
4.9/5
(37)
Showing 81 - 100 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)