Exam 4: Information Security Policy
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Which of the following is NOT among the three types of InfoSec policies based on NIST's Special Publication 800-14?
(Multiple Choice)
4.9/5
(36)
What is the final component of the design and implementation of effective policies?Describe this component.
(Essay)
4.8/5
(41)
A section of policy that should specify users' and systems administrators' responsibilities.
(Multiple Choice)
4.9/5
(44)
A(n)____________________,which is usually presented on a screen to the user during software installation,spells out fair and responsible use of the software being installed.
(Short Answer)
4.8/5
(35)
According to NIST SP 800-18,Rev.1,whichindividual is responsible for the creation,revision,distribution,and storage of the policy?
(Multiple Choice)
4.8/5
(42)
An organizational policy that provides detailed,targetedguidance to instruct all members of the organization in the use of a resource,such as one of itsprocesses or technologies.
(Multiple Choice)
4.7/5
(35)
Examples of actions that illustrate compliance with policies are known as laws.
(True/False)
4.9/5
(38)
In the bull's-eye model,the ____________________ layer is the place where threats from public networks meet the organization's networking infrastructure.
(Short Answer)
4.8/5
(37)
The three types of information security policies include the enterprise information security policy,the issue-specific security policy,and the ____________________ security policy.
(Short Answer)
4.9/5
(30)
Which section of an ISSP should outline a specific methodology for the review and modification of the ISSP?
(Multiple Choice)
4.9/5
(38)
The 'Authorized Uses' section of an ISSP specifies what the identified technology cannot be used for.
(True/False)
4.7/5
(31)
A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC?
(Multiple Choice)
4.9/5
(43)
Technology is the essential foundation of an effective information security program._____________
(True/False)
4.8/5
(26)
Showing 41 - 56 of 56
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)