Exam 4: Information Security Policy
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Some policies incorporate a ____ indicating a specific date the policy will expire.
(Multiple Choice)
4.8/5
(37)
The Flesch-Kincaid Grade Level score evaluates writing on a U.S.grade-school level.
(True/False)
4.8/5
(43)
The steps outlined in guidelines must meet the requirements of the standards from which they were created.
(True/False)
4.9/5
(38)
The ____________________ information security program policy is the highest level of policy.
(Short Answer)
4.8/5
(42)
It is during the design phase of the SecSDLC that the policy development team must provide for policy distribution._________________________
(True/False)
4.9/5
(40)
____________________ are the specific configuration codes entered into security systems to guide the execution of the system when information is passing through it.
(Short Answer)
4.8/5
(39)
When a policy is created and distributed without software automation tools,it is often not clear which manager has approved it.
(True/False)
4.8/5
(35)
The two general methods of implementing technical controls are access control lists and configuration rules._________________________
(True/False)
4.8/5
(33)
For policies to be effective,they must be properly formally agreed to by act or ____________________.
(Short Answer)
4.7/5
(26)
SysSPs can be separated into two general groups: managerial guidance and ____________________.
(Short Answer)
4.8/5
(44)
Describe the advantages and disadvantages of using a modular approach for creating and managing the ISSP.
(Essay)
4.8/5
(41)
Showing 121 - 133 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)