Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following sections of the ISSP should provide instructions on how to report observed or suspected policy infractions? 

(Multiple Choice)
4.9/5
(41)

The high-level information security policy that sets the strategic direction,scope,and tone for all of an organization's security efforts

(Multiple Choice)
4.9/5
(27)

Which of the following are the two general groups into which SysSPs can be separated? 

(Multiple Choice)
4.8/5
(45)

Specifies which subjects and objects that users or groups can access.

(Multiple Choice)
4.8/5
(28)

​Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems.​

(Multiple Choice)
4.8/5
(45)

When an organization demonstrates that it is continuously attempting to meet the requirements of the market in which it operates,what is it ensuring? 

(Multiple Choice)
4.7/5
(43)

Which of the following is NOT an aspect of access regulated by ACLs? 

(Multiple Choice)
4.8/5
(50)

List the advantages and disadvantages of using a modular approach for creating and managing the ISSP.

(Essay)
4.8/5
(34)

One of the goals of an issue-specific security policy is to indemnify the organization against liability for an employee's inappropriate or illegal use of the system.

(True/False)
4.8/5
(37)

A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC? 

(Multiple Choice)
4.8/5
(41)

According to NIST SP 800-18,Rev.1,which individual is responsible for the creation,revision,distribution,and storage of the policy? 

(Multiple Choice)
4.9/5
(32)

In which phase of the SecSDLC must the team create a plan to distribute and verify the distribution of the policies? 

(Multiple Choice)
4.8/5
(38)

Which type of security policy is intended to provide a common understanding of the purposes for which an employee can and cannot use a resource? 

(Multiple Choice)
4.9/5
(44)

What should an effective ISSP accomplish?

(Essay)
4.8/5
(31)

What is a SysSP and what is one likely to include?

(Essay)
4.9/5
(41)

In which phase of the development of an InfoSec policy must a plan to distribute the policies be developed?  Why is this important?

(Essay)
4.7/5
(43)

When issues are addressed by moving from the general to the specific, always starting with policy.

(Multiple Choice)
4.8/5
(40)

Policies must specify penalties for unacceptable behavior and define an appeals process.

(True/False)
5.0/5
(40)

Rule-based policies are less specific to the operation of a system than access control lists.

(True/False)
4.8/5
(39)

In addition to specifying the penalties for unacceptable behavior,what else must a policy specify? 

(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)