Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to Charles Cresson Wood "policies are important reference documents for internal ____ and for the resolution of legal disputes about management's due diligence; policy documents can act as a clear statement of management's intent".

(Multiple Choice)
4.9/5
(30)

The ____ component of an EISP defines the organizational structure designed to support information security within the organization.

(Multiple Choice)
4.8/5
(44)

To ensure due diligence an organization must demonstrate that it is continuously attempting to meet the requirements of the market in which it operates._________________________

(True/False)
4.9/5
(32)

An individual approach to creating the ISSPs is well controlled by centrally managed procedures assuring complete topic coverage.

(True/False)
4.8/5
(44)

In some organizations,that which is not permitted is ____________________ while in other organizations,the reverse is true.

(Short Answer)
4.7/5
(33)

If an organization wants to prohibit the criminal use of the organization's information systems,it should do so in the Systems Management section of the ISSP._________________________

(True/False)
4.8/5
(29)

Practices,procedures,and ____________________ consist of detailed steps that must meet the requirements of standards.

(Short Answer)
4.9/5
(31)

For policies to be effective,they must first be developed using generally-accepted practices._________________________

(True/False)
4.9/5
(29)

A ____ specifies which subjects and objects users or groups can access.

(Multiple Choice)
4.8/5
(35)

The ISSP is not a binding agreement between the organization and its members.

(True/False)
4.9/5
(32)

A quality information security program begins and ends with policy.

(True/False)
4.7/5
(39)

Access control lists can only be used to restrict access according to the user.

(True/False)
4.8/5
(42)

A(n)individual approach to creating the ISSPs can suffer from poor policy dissemination,enforcement,and review._________________________

(True/False)
4.8/5
(37)

The information security policy is written during the ____ phase of the SecSDLC.

(Multiple Choice)
4.8/5
(40)

____________________ include the user access lists,matrices,and capability tables that govern the rights and privileges of users.

(Short Answer)
4.8/5
(39)

Users have the right to use an organization's information systems to browse the Web,even if this right is not specified in the ISSP.

(True/False)
4.9/5
(36)

To be certain that employees understand the policy,the document must be written at a reasonable reading level with minimal ____.

(Multiple Choice)
4.9/5
(40)

A ____ is a more detailed statement identifying a measurement of behavior and specifies what must be done to comply with a policy.

(Multiple Choice)
4.8/5
(29)

A(n)____________________ issue-specific security policy document unifies policy creation and administration,while maintaining each specific issue's requirements.

(Short Answer)
4.8/5
(36)

In some systems,capability tables are known as user profiles.

(True/False)
4.7/5
(44)
Showing 101 - 120 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)