Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List the advantages and disadvantages of using a modular approach for creating and managing the ISSP.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

The advantages of the modular ISSP policy are: Often considered an optimal balance between the individual ISSP and the comprehensive ISSP approaches Well controlled by centrally managed procedures,assuring complete topic coverage Clear assignment to a responsible department Written by those with superior subject matter expertise for technology-specific systems The disadvantages of the modular ISSP policy are: May be more expensive than other alternatives Implementation can be difficult to manage

Which of the following is NOT an aspect of access regulated by ACLs?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

List the significant guidelines used in the formulation of effective information security policy.

Free
(Essay)
4.8/5
(40)
Correct Answer:
Verified

For policies to be effective,they must be properly:
1.Developed using industry-accepted practices
2.Distributed or disseminated using all appropriate methods
3.Reviewed or read by all employees
4.Understood by all employees
5.Formally agreed to by act or assertion
6.Uniformly applied and enforced

When issues are addressed by moving from the general to the specific,always starting with policy.

(Multiple Choice)
4.9/5
(38)

Information securitypolicies are designed to provide structure in the workplace and explain the will of the organization'smanagement.____________

(True/False)
4.8/5
(29)

Which policy is the highest level of policy and is usually created first?

(Multiple Choice)
4.8/5
(33)

Non mandatory recommendations that the employee may use as a reference incomplying with a policy.are known as regulations.____________

(True/False)
4.8/5
(41)

The responsibilities of both the users and the systems administrators with regard to specific systems administration duties should be specified in the ____________________ section of the ISSP.

(Short Answer)
5.0/5
(33)

Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?

(Multiple Choice)
4.9/5
(37)

The need for effective policy management has led to the emergence of a class of hardware tools that supports policy development,implementation,and maintenance.

(True/False)
4.8/5
(33)

When an organization demonstrates that it is continuously attempting to meet the requirements of the market in which it operates,what is it ensuring?

(Multiple Choice)
4.8/5
(35)

What are the two general methods for implementing technical controls?

(Multiple Choice)
4.7/5
(33)

In which phase of the development of an InfoSec policy must a plan to distribute the policies be developed?Why is this important?

(Essay)
4.8/5
(38)

Step-by-step instructions designed to assist employees in following policies,standards and guidelines.

(Multiple Choice)
4.7/5
(26)

What should an effective ISSP accomplish?

(Essay)
4.9/5
(37)

Which of the following are the two general groups into which SysSPs can be separated?

(Multiple Choice)
4.8/5
(41)

Which of the following sections of the ISSP should provide instructions on how to report observed or suspected policy infractions?

(Multiple Choice)
4.8/5
(32)

In addition to specifying the penalties for unacceptable behavior,what else must a policy specify?

(Multiple Choice)
4.8/5
(41)

Which type of document is a more detailed statement of what must be done to comply with a policy?

(Multiple Choice)
4.8/5
(38)

Organizational policies that often function asstandards or procedures to be used when configuring or maintaining systems. ​

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)