Exam 4: Information Security Policy
List the advantages and disadvantages of using a modular approach for creating and managing the ISSP.
The advantages of the modular ISSP policy are: Often considered an optimal balance between the individual ISSP and the comprehensive ISSP approaches Well controlled by centrally managed procedures,assuring complete topic coverage Clear assignment to a responsible department Written by those with superior subject matter expertise for technology-specific systems The disadvantages of the modular ISSP policy are: May be more expensive than other alternatives Implementation can be difficult to manage
Which of the following is NOT an aspect of access regulated by ACLs?
B
List the significant guidelines used in the formulation of effective information security policy.
For policies to be effective,they must be properly:
1.Developed using industry-accepted practices
2.Distributed or disseminated using all appropriate methods
3.Reviewed or read by all employees
4.Understood by all employees
5.Formally agreed to by act or assertion
6.Uniformly applied and enforced
When issues are addressed by moving from the general to the specific,always starting with policy.
Information securitypolicies are designed to provide structure in the workplace and explain the will of the organization'smanagement.____________
Which policy is the highest level of policy and is usually created first?
Non mandatory recommendations that the employee may use as a reference incomplying with a policy.are known as regulations.____________
The responsibilities of both the users and the systems administrators with regard to specific systems administration duties should be specified in the ____________________ section of the ISSP.
Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?
The need for effective policy management has led to the emergence of a class of hardware tools that supports policy development,implementation,and maintenance.
When an organization demonstrates that it is continuously attempting to meet the requirements of the market in which it operates,what is it ensuring?
What are the two general methods for implementing technical controls?
In which phase of the development of an InfoSec policy must a plan to distribute the policies be developed?Why is this important?
Step-by-step instructions designed to assist employees in following policies,standards and guidelines.
Which of the following are the two general groups into which SysSPs can be separated?
Which of the following sections of the ISSP should provide instructions on how to report observed or suspected policy infractions?
In addition to specifying the penalties for unacceptable behavior,what else must a policy specify?
Which type of document is a more detailed statement of what must be done to comply with a policy?
Organizational policies that often function asstandards or procedures to be used when configuring or maintaining systems.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)