Skip to main content

Test Bank For Developing Cybersecurity Programs and Policies, 4th Edition Omar Santos

Page 1

Test Bank For Developing Cybersecurity Programs and Policies in an AI-Driven World (Santos) Chapter 1-17 Chapter 1 Understanding Cybersecurity Policy and Governance 1) Which of the following elements ensures a policy is enforceable? A) Compliance can be measured. B) Appropriate sanctions are applied when the policy is violated. C) Appropriate administrative, technical, and physical controls are put in place to support the policy. D) All of the above Answer: D 2) Which of the following is typically not a component of cybersecurity programs and policies? A) Oversight of cyber risk management B) Sharing of threat intelligence C) Implementation of traditional information security measures D) Conducting incident response and digital forensics Answer: C 3) Which of the following is an example of an information asset? A) Business plans B) Employee records C) Company reputation D) All of the above Answer: D 4) Policy implementation and enforcement are part of which of the following phases of the cybersecurity policy life cycle? A) Develop B) Review C) Adopt D) Publish Answer: C 5) Which of the following is the correct order of the cybersecurity policy life cycle? A) Review, develop, adopt, publish B) Develop, publish, adopt, review C) Publish, develop, review, adopt D) Review, adopt, develop, publish Answer: B 6) Endorsed is one of the seven policy characteristics. Which of the following statements best describes endorsed? A) The policy is supported and followed by management. 1 Copyright © 2025 Pearson Education, Inc.


Turn static files into dynamic content formats.

Create a flipbook