Deck 13: Policies, Standards and Guidelines
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 13: Policies, Standards and Guidelines
1
To minimize ambiguity, it is a good idea to specify the technologies to be used in a policy
False
2
Policy review is usually triggered by all of the following except
A) Time lapse since last review
B) Change in vendors for significant technologies
C) Significant technology change
D) Changes in regulatory compliance
A) Time lapse since last review
B) Change in vendors for significant technologies
C) Significant technology change
D) Changes in regulatory compliance
B
3
A standard is
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
D
4
Compliance is
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) Following specifications put forth by policies or legal requirements
D) A defined set of rules, accepted and adopted by several organizations
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) Following specifications put forth by policies or legal requirements
D) A defined set of rules, accepted and adopted by several organizations
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
From the perspective of information security, HIPAA defines
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The relationship between policies, standards and guidelines is that
A) Policies and standards emanate from guidelines
B) Standards and guidelines emanate from policies
C) Policies emanate from standards and guidelines
D) Standards, but not guidelines emanate from policies
A) Policies and standards emanate from guidelines
B) Standards and guidelines emanate from policies
C) Policies emanate from standards and guidelines
D) Standards, but not guidelines emanate from policies
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The need for the policy is specified in the
A) Scope
B) Statement
C) Overview
D) Enforcement
A) Scope
B) Statement
C) Overview
D) Enforcement
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
If an organization specifies that all laptops in the organization will use whole-disk encryption, the specific encryption technology will be specified in a
A) Guideline
B) Standard
C) Policy
D) Law
A) Guideline
B) Standard
C) Policy
D) Law
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Acceptable use policies describe
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) A defined set of rules, accepted and adopted by several organizations
C) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
D) A document that records a high-level principle or course of action that has been decided on
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) A defined set of rules, accepted and adopted by several organizations
C) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
D) A document that records a high-level principle or course of action that has been decided on
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
How the organization will deal with the situation covered by the policy is specified in the
A) Statement
B) Enforcement
C) Overview
D) Scope
A) Statement
B) Enforcement
C) Overview
D) Scope
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Who or what is covered by the policy is specified in the
A) Overview
B) Statement
C) Enforcement
D) Scope
A) Overview
B) Statement
C) Enforcement
D) Scope
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
It is generally advised to consolidate all policy issues into one policy document
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The first section of a policy generally specifies
A) Who or what is covered by the policy
B) Any definitions used in the policy
C) The statement of the policy
D) The need for the policy
A) Who or what is covered by the policy
B) Any definitions used in the policy
C) The statement of the policy
D) The need for the policy
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The sections of a policy are generally written in the sequence
A) Overview, scope, definitions, statement, enforcement
B) Definitions, overview, scope, statement, enforcement
C) Overview, definitions, statement, scope, enforcement
D) Overview, enforcement, scope, definitions, statement
A) Overview, scope, definitions, statement, enforcement
B) Definitions, overview, scope, statement, enforcement
C) Overview, definitions, statement, scope, enforcement
D) Overview, enforcement, scope, definitions, statement
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Activities, settings and measurements accepted by all firms in an industry are
A) Global policies
B) General guidelines
C) Acceptable use policies
D) Industry standards
A) Global policies
B) General guidelines
C) Acceptable use policies
D) Industry standards
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A guideline is
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A defined set of rules, accepted and adopted by several organizations
D) A document that records a high-level principle or course of action that has been decided on
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A defined set of rules, accepted and adopted by several organizations
D) A document that records a high-level principle or course of action that has been decided on
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
In the United States one of the primary sources of standards for information security concerns is the
A) National Institute of Standards and Technology
B) Massachusetts Institute of Technology
C) Harvard University
D) US State Department
A) National Institute of Standards and Technology
B) Massachusetts Institute of Technology
C) Harvard University
D) US State Department
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Policies, standards and guidelines are useful because they
A) Allow security administrators to obtain executive level endorsement for security objectives
B) Keep managers busy generating documents
C) Allow security administrators to educate the organization's leadership about information security
D) Help in detecting information security incidents
A) Allow security administrators to obtain executive level endorsement for security objectives
B) Keep managers busy generating documents
C) Allow security administrators to educate the organization's leadership about information security
D) Help in detecting information security incidents
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Security policies serve all the following functions except
A) Conveying organizational priorities
B) Obtaining managerial backing
C) Evading responsibility
D) Ensuring organizational consistency
A) Conveying organizational priorities
B) Obtaining managerial backing
C) Evading responsibility
D) Ensuring organizational consistency
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
A policy is
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
From the perspective of information security, the Sarbanes-Oxley SOX act defines
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
From the perspective of information security, the Family Educational Rights and Privacy FERPA act defines
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
From the perspective of information security, the Gramm-Leach-Bliley GLB act defines
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
From the perspective of information security, export control laws defines
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Prohibitions regarding the unlicensed export of specified materials or information
A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Prohibitions regarding the unlicensed export of specified materials or information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Key information security issues for which an organization should have policies include all of the following except
A) Employee count
B) Incident response
C) Acceptable use
D) Information classification
A) Employee count
B) Incident response
C) Acceptable use
D) Information classification
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck