Exam 4: Information Security Policy
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Which of the following sections of the ISSP should provide instructions on how to report observed or suspected policy infractions?
(Multiple Choice)
4.9/5
(41)
The high-level information security policy that sets the strategic direction,scope,and tone for all of an organization's security efforts
(Multiple Choice)
4.9/5
(27)
Which of the following are the two general groups into which SysSPs can be separated?
(Multiple Choice)
4.8/5
(45)
Specifies which subjects and objects that users or groups can access.
(Multiple Choice)
4.8/5
(28)
Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems.
(Multiple Choice)
4.8/5
(45)
When an organization demonstrates that it is continuously attempting to meet the requirements of the market in which it operates,what is it ensuring?
(Multiple Choice)
4.7/5
(43)
Which of the following is NOT an aspect of access regulated by ACLs?
(Multiple Choice)
4.8/5
(50)
List the advantages and disadvantages of using a modular approach for creating and managing the ISSP.
(Essay)
4.8/5
(34)
One of the goals of an issue-specific security policy is to indemnify the organization against liability for an employee's inappropriate or illegal use of the system.
(True/False)
4.8/5
(37)
A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC?
(Multiple Choice)
4.8/5
(41)
According to NIST SP 800-18,Rev.1,which individual is responsible for the creation,revision,distribution,and storage of the policy?
(Multiple Choice)
4.9/5
(32)
In which phase of the SecSDLC must the team create a plan to distribute and verify the distribution of the policies?
(Multiple Choice)
4.8/5
(38)
Which type of security policy is intended to provide a common understanding of the purposes for which an employee can and cannot use a resource?
(Multiple Choice)
4.9/5
(44)
In which phase of the development of an InfoSec policy must a plan to distribute the policies be developed? Why is this important?
(Essay)
4.7/5
(43)
When issues are addressed by moving from the general to the specific, always starting with policy.
(Multiple Choice)
4.8/5
(40)
Policies must specify penalties for unacceptable behavior and define an appeals process.
(True/False)
5.0/5
(40)
Rule-based policies are less specific to the operation of a system than access control lists.
(True/False)
4.8/5
(39)
In addition to specifying the penalties for unacceptable behavior,what else must a policy specify?
(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 56
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)