Security Policies and Procedures Final Exam Questions - 696 Verified Questions

Page 1


Security Policies and Procedures

Final Exam Questions

Course Introduction

This course explores the foundational concepts, development, implementation, and management of security policies and procedures within organizations. Students will examine the critical role that policies and procedures play in establishing security standards, governing system usage, and mitigating risks associated with information systems. Topics include best practices for drafting and communicating security policies, policy lifecycle management, compliance with legal and regulatory requirements, and the integration of security procedures into organizational workflows. Through case studies and practical exercises, students learn how to assess security needs, craft effective policy documents, and evaluate the effectiveness of implemented procedures to ensure robust organizational security.

Recommended Textbook

Principles of Information Security 5th Edition by Michael E. Whitman

Available Study Resources on Quizplus 12 Chapters

696 Verified Questions

696 Flashcards

Source URL: https://quizplus.com/study-set/2374

Page 2

Chapter 1: Introduction to the Management of Information Security

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/47110

Sample Questions

Q1) Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?

A) protection

B) people

C) projects

D) policy

Answer: B

Q2) Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls?

A) brute force

B) DoS

C) back door

D) hoax

Answer: C

Q3) A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

Answer: phreaker

Q4) Attempting to reverse-calculate a password is called ____________________.

Answer: cracking

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Compliance: Law and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/47111

Sample Questions

Q1) Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?

A) Applied ethics

B) Meta-ethics

C) Normative ethics

D) Deontological ethics

Answer: D

Q2) Which law addresses privacy and security concerns associated with the electronic transmission of PHI?

A) USA Patriot Act of 2001

B) American Recovery and Reinvestment Act

C) Health Information Technology for Economic and Clinical Health Act

D) National Information Infrastructure Protection Act of 1996

Answer: C

Q3) Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.

Answer: cultural mores

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Governance and Strategic Planning for Security

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/47112

Sample Questions

Q1) What is the values statement and what is its importance to an organization?

Answer: One of the first positions that management must articulate is the values statement.The trust and confidence of stakeholders and the public are important factors for any organization.By establishing a formal set of organizational principles and qualities in a values statement,as well as benchmarks for measuring behavior against these published values,an organization makes its conduct and performance standards clear to its employees and the public.

Q2) The National Association of Corporate Directors (NACD)recommends four essential practices for boards of directors.Which of the following is NOT one of these recommended practices?

A) Hold regular meetings with the CIO to discuss tactical InfoSec planning

B) Assign InfoSec to a key committee and ensure adequate support for that committee

C) Ensure the effectiveness of the corporation's InfoSec policy through review and approval

D) Identify InfoSec leaders, hold them accountable, and ensure support for them

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Information Security Policy

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/47113

Sample Questions

Q1) What is the final component of the design and implementation of effective policies?Describe this component.

Q2) Which section of an ISSP should outline a specific methodology for the review and modification of the ISSP?

A) Policy Review and Modification

B) Limitations of Liability

C) Systems Management

D) Statement of Purpose

Q3) A clear declaration thatoutlines the scope and applicability of a policy.

A)capability table

B)statement of purpose

C)Bull's eye model

D)SysSP

E)procedures

F)InfoSec policy

G)standard

H)access control lists

I)systems management

J)ISSP

Q4) What are the four elements that an EISP document should include?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Developing the Security Program

Available Study Resources on Quizplus for this Chatper

55 Verified Questions

55 Flashcards

Source URL: https://quizplus.com/quiz/47114

Sample Questions

Q1) Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.

A)True

B)False

Q2) Which of the following is an advantage of the formal class method of training?

A) Personal

B) Self-paced, can go as fast or as slow as the trainee needs

C) Can be scheduled to fit the needs of the trainee

D) Interaction with trainer is possible

Q3) A task or subtask becomes a(n) <U>action step </U> when it can be completed by one individual or skill set and when it includes a single deliverable._________________________

A)True

B)False

Q4) Which of the following is an advantage of the one-on-one method of training?

A) Trainees can learn from each other

B) Very cost-effective

C) Customized

D) Maximizes use of company resources

Q5) What minimum attributes for project tasks does the WBS document?

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Risk Management: Identifying and Assessing Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/47115

Sample Questions

Q1) Two of the activities involved in risk management include identifying risks and assessing risks.Which of the following activities is part of the risk identification process?

A) Determining the likelihood that vulnerable systems will be attacked by specific threats

B) Calculating the severity of risks to which assets are exposed in their current setting

C) Assigning a value to each information asset

D) Documenting and reporting the findings of risk identification and assessment

Q2) An asset valuation approach that uses categorical or nonnumericvalues rather than absolute numerical measures is known as <U>numberless</U> assessment.____________

A)True

B)False

Q3) Determining the cost of recovery from an attack is one calculation that must be made to identify risk,what is another?

A) Cost of prevention

B) Cost of litigation

C) Cost of detection

D) Cost of identification

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 7: Risk Management: Controlling Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/47116

Sample Questions

Q1) The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident,disaster,or attack through effective contingency planning and preparation is known as the <U>mitigation</U> risk control strategy.____________

A)True

B)False

Q2) The Microsoft Risk Management Approach includes four phases.Which of the following is NOT one of them?

A) conducting decision support

B) implementing controls

C) evaluating alternative strategies

D) measuring program effectiveness

Q3) Also known as an economic feasibility study,the formal assessment and presentation of the economic expenditures needed for a particular security control,contrasted with its projected value to the organization is known ascost-benefit<U> analysis</U> (CBA).____________

A)True

B)False

Q4) Describe operational feasibility.

Q5) What is the OCTAVE method approach to risk management?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Security Management Models

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/47117

Sample Questions

Q1) One approach used to categorize access control methodologies categorizes controls based on their operational impact on the organization.What are these categories as described by NIST?

Q2) A security blueprint is the outline of the more thorough security framework.

A)True

B)False

Q3) The principle of limiting users' access privileges to the specific informationrequired to perform their assigned tasks is known as<U>need-to-know</U>.____________

A)True

B)False

Q4) In which form of access control is access to a specific set of information contingent on its subject matter?

A) content-dependent access controls

B) constrained user interfaces

C) temporal isolation

D) None of these

Q5) Access controls are build on three key principles.List and briefly define them.

Q6) What are the two primary access modes of the Bell-LaPadula model and what do they restrict?

10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Security Management Practices

Available Study Resources on Quizplus for this Chatper

59 Verified Questions

59 Flashcards

Source URL: https://quizplus.com/quiz/47118

Sample Questions

Q1) Which of the following is a possible result of failure to establish and maintain standards of due care and due diligence?

A) Baselining

B) Legal liability

C) Competitive disadvantage

D) Certification revocation

Q2) Why must you do more than simply list the InfoSec measurements collected when reporting them?Explain.

Q3) The authorization by an oversight authority of an IT system to process,store,ortransmit information is known as<U> certification</U>.____________

A)True

B)False

Q4) Describe the three tier approach of the RMF as defined by NIST SP 800-37.

Q5) <U>Standardization</U> is an an attempt to improve information security practices by comparing anorganization's efforts against those of a similar organization or an industry-developedstandard to produce results it would like to duplicate.____________

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Planning for Contingencies

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/47119

Sample Questions

Q1) A(n)____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.

Q2) Which of the following is usually conducted via leased lines or secure Internet connections whereby the receiving server archives the data as it is received?.

A) Database shadowing

B) Timesharing

C) Traditional backups

D) Electronic vaulting

Q3) A(n) <U>wrap-up</U> review is a detailedexamination and discussion of the events that occurred duringan incident or disaster,from first detection to final recovery.____________

A)True

B)False

Q4) The bulk batch-transfer of data to an off-site facility is known as

Q5) ____________________ planning ensures that critical business functions can continue if a disaster occurs.

Q6) When undertaking the BIA,whatshouldthe organization consider?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Personnel and Security

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/47120

Sample Questions

Q1) To move the InfoSec discipline forward,organizations should take all but which of the following steps?

A) Learn more about the requirements and qualifications for InfoSec and IT positions

B) Learn more about InfoSec budgetary and personnel needs

C) Insist all mid-level and upper-level management take introductory InfoSec courses

D) Grant the InfoSec function an appropriate level of influence and prestige

Q2) computer forensics certification from ISFCE

A)definers

B)builders

C)security manager

D)security technician

E)systems programmer

F)ethics officer

G)CISSP

H)SSCP

I)SANS

J)CCE

Q3) List the six key principles that should shape the career of a CISO.

To view all questions and flashcards with answers, click on the resource link above.

13

Chapter 12: Protection Mechanisms

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/47121

Sample Questions

Q1) The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

A)True

B)False

Q2) A(n)____________________ is any device that prevents a specific type of information from moving between an untrusted network and a trusted network.

Q3) Which of the following biometric authentication systems is the most accepted by users?

A) Keystroke pattern recognition

B) Fingerprint recognition

C) Signature recognition

D) Retina pattern recognition

Q4) Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping?

A) Network-address translation

B) Screened-subnet firewall

C) Port-address translation

D) Private address mapping

To view all questions and flashcards with answers, click on the resource link above.

14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.