Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT among the three types of InfoSec policies based on NIST's Special Publication 800-14?

(Multiple Choice)
4.9/5
(36)

What is the final component of the design and implementation of effective policies?Describe this component.

(Essay)
4.8/5
(41)

A section of policy that should specify users' and systems administrators' responsibilities.

(Multiple Choice)
4.9/5
(44)

A(n)____________________,which is usually presented on a screen to the user during software installation,spells out fair and responsible use of the software being installed.

(Short Answer)
4.8/5
(35)

According to NIST SP 800-18,Rev.1,whichindividual is responsible for the creation,revision,distribution,and storage of the policy?

(Multiple Choice)
4.8/5
(42)

What are configuration rules?Provide examples.

(Essay)
4.8/5
(38)

An organizational policy that provides detailed,targetedguidance to instruct all members of the organization in the use of a resource,such as one of itsprocesses or technologies.

(Multiple Choice)
4.7/5
(35)

Examples of actions that illustrate compliance with policies are known as laws.

(True/False)
4.9/5
(38)

In the bull's-eye model,the ____________________ layer is the place where threats from public networks meet the organization's networking infrastructure.

(Short Answer)
4.8/5
(37)

What is a SysSP and what is one likely to include?

(Essay)
4.9/5
(38)

The three types of information security policies include the enterprise information security policy,the issue-specific security policy,and the ____________________ security policy.

(Short Answer)
4.9/5
(30)

Which section of an ISSP should outline a specific methodology for the review and modification of the ISSP?

(Multiple Choice)
4.9/5
(38)

List the major components of the ISSP.

(Essay)
4.9/5
(37)

The 'Authorized Uses' section of an ISSP specifies what the identified technology cannot be used for.

(True/False)
4.7/5
(31)

A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC?

(Multiple Choice)
4.9/5
(43)

Technology is the essential foundation of an effective information security program​._____________

(True/False)
4.8/5
(26)
Showing 41 - 56 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)