Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Some policies incorporate a ____ indicating a specific date the policy will expire.

(Multiple Choice)
4.8/5
(37)

The Flesch-Kincaid Grade Level score evaluates writing on a U.S.grade-school level.

(True/False)
4.8/5
(43)

The steps outlined in guidelines must meet the requirements of the standards from which they were created.

(True/False)
4.9/5
(38)

The ____________________ information security program policy is the highest level of policy.

(Short Answer)
4.8/5
(42)

All rule-based policies must deal with users directly.

(True/False)
4.9/5
(44)

It is during the design phase of the SecSDLC that the policy development team must provide for policy distribution._________________________

(True/False)
4.9/5
(40)

Standards are created from ____.

(Multiple Choice)
4.9/5
(33)

____________________ are the specific configuration codes entered into security systems to guide the execution of the system when information is passing through it.

(Short Answer)
4.8/5
(39)

When a policy is created and distributed without software automation tools,it is often not clear which manager has approved it.

(True/False)
4.8/5
(35)

The two general methods of implementing technical controls are access control lists and configuration rules._________________________

(True/False)
4.8/5
(33)

For policies to be effective,they must be properly formally agreed to by act or ____________________.

(Short Answer)
4.7/5
(26)

SysSPs can be separated into two general groups: managerial guidance and ____________________.

(Short Answer)
4.8/5
(44)

Describe the advantages and disadvantages of using a modular approach for creating and managing the ISSP.

(Essay)
4.8/5
(41)
Showing 121 - 133 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)