Exam 4: Information Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Specifications of authorization that govern the rights and privileges of users to a particular information asset.

(Multiple Choice)
4.7/5
(40)

List the major components of the ISSP.

(Essay)
4.9/5
(41)

Technology is the essential foundation of an effective information security program​.

(True/False)
4.9/5
(40)

Which section of an ISSP should outline a specific methodology for the review and modification of the ISSP? 

(Multiple Choice)
4.7/5
(42)

A risk assessment is performed during which phase of the SecSDLC? 

(Multiple Choice)
5.0/5
(35)

Which of the following is a policy implementation model that addresses issues by moving from the general to the specific and is a proven mechanism for prioritizing complex changes? 

(Multiple Choice)
4.8/5
(41)

An organizational policy that provides detailed,targeted guidance to instruct all members of the organization in the use of a resource,such as one of its processes or technologies.

(Multiple Choice)
4.8/5
(28)

Step-by-step instructions designed to assist employees in following policies, standards and guidelines.

(Multiple Choice)
4.8/5
(43)

A clear declaration that outlines the scope and applicability of a policy.

(Multiple Choice)
4.9/5
(42)

Which policy is the highest level of policy and is usually created first? 

(Multiple Choice)
4.7/5
(26)

What are the four elements that an EISP document should include?

(Essay)
4.9/5
(40)

A section of policy that should specify users' and systems administrators' responsibilities.

(Multiple Choice)
4.9/5
(33)

A(n)____________________,which is usually presented on a screen to the user during software installation,spells out fair and responsible use of the software being installed.

(Essay)
4.9/5
(42)

The need for effective policy management has led to the emergence of a class of hardware tools that supports policy development,implementation,and maintenance.​

(True/False)
4.8/5
(39)

List the significant guidelines used in the formulation of effective information security policy.

(Essay)
4.7/5
(32)

What are the two general methods for implementing technical controls? 

(Multiple Choice)
4.8/5
(44)
Showing 41 - 56 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)