Deck 13: Policies, Standards and Guidelines

ملء الشاشة (f)
exit full mode
سؤال
To minimize ambiguity, it is a good idea to specify the technologies to be used in a policy
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Policy review is usually triggered by all of the following except

A) Time lapse since last review
B) Change in vendors for significant technologies
C) Significant technology change
D) Changes in regulatory compliance
سؤال
A standard is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
سؤال
Compliance is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) Following specifications put forth by policies or legal requirements
D) A defined set of rules, accepted and adopted by several organizations
سؤال
From the perspective of information security, HIPAA defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
سؤال
The relationship between policies, standards and guidelines is that

A) Policies and standards emanate from guidelines
B) Standards and guidelines emanate from policies
C) Policies emanate from standards and guidelines
D) Standards, but not guidelines emanate from policies
سؤال
The need for the policy is specified in the

A) Scope
B) Statement
C) Overview
D) Enforcement
سؤال
If an organization specifies that all laptops in the organization will use whole-disk encryption, the specific encryption technology will be specified in a

A) Guideline
B) Standard
C) Policy
D) Law
سؤال
Acceptable use policies describe

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) A defined set of rules, accepted and adopted by several organizations
C) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
D) A document that records a high-level principle or course of action that has been decided on
سؤال
How the organization will deal with the situation covered by the policy is specified in the

A) Statement
B) Enforcement
C) Overview
D) Scope
سؤال
Who or what is covered by the policy is specified in the

A) Overview
B) Statement
C) Enforcement
D) Scope
سؤال
It is generally advised to consolidate all policy issues into one policy document
سؤال
The first section of a policy generally specifies

A) Who or what is covered by the policy
B) Any definitions used in the policy
C) The statement of the policy
D) The need for the policy
سؤال
The sections of a policy are generally written in the sequence

A) Overview, scope, definitions, statement, enforcement
B) Definitions, overview, scope, statement, enforcement
C) Overview, definitions, statement, scope, enforcement
D) Overview, enforcement, scope, definitions, statement
سؤال
Activities, settings and measurements accepted by all firms in an industry are

A) Global policies
B) General guidelines
C) Acceptable use policies
D) Industry standards
سؤال
A guideline is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A defined set of rules, accepted and adopted by several organizations
D) A document that records a high-level principle or course of action that has been decided on
سؤال
In the United States one of the primary sources of standards for information security concerns is the

A) National Institute of Standards and Technology
B) Massachusetts Institute of Technology
C) Harvard University
D) US State Department
سؤال
Policies, standards and guidelines are useful because they

A) Allow security administrators to obtain executive level endorsement for security objectives
B) Keep managers busy generating documents
C) Allow security administrators to educate the organization's leadership about information security
D) Help in detecting information security incidents
سؤال
Security policies serve all the following functions except

A) Conveying organizational priorities
B) Obtaining managerial backing
C) Evading responsibility
D) Ensuring organizational consistency
سؤال
A policy is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
سؤال
From the perspective of information security, the Sarbanes-Oxley SOX act defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
سؤال
From the perspective of information security, the Family Educational Rights and Privacy FERPA act defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
سؤال
From the perspective of information security, the Gramm-Leach-Bliley GLB act defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
سؤال
From the perspective of information security, export control laws defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Prohibitions regarding the unlicensed export of specified materials or information
سؤال
Key information security issues for which an organization should have policies include all of the following except

A) Employee count
B) Incident response
C) Acceptable use
D) Information classification
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Policies, Standards and Guidelines
1
To minimize ambiguity, it is a good idea to specify the technologies to be used in a policy
False
2
Policy review is usually triggered by all of the following except

A) Time lapse since last review
B) Change in vendors for significant technologies
C) Significant technology change
D) Changes in regulatory compliance
B
3
A standard is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
D
4
Compliance is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) Following specifications put forth by policies or legal requirements
D) A defined set of rules, accepted and adopted by several organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
From the perspective of information security, HIPAA defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
The relationship between policies, standards and guidelines is that

A) Policies and standards emanate from guidelines
B) Standards and guidelines emanate from policies
C) Policies emanate from standards and guidelines
D) Standards, but not guidelines emanate from policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
The need for the policy is specified in the

A) Scope
B) Statement
C) Overview
D) Enforcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
If an organization specifies that all laptops in the organization will use whole-disk encryption, the specific encryption technology will be specified in a

A) Guideline
B) Standard
C) Policy
D) Law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Acceptable use policies describe

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) A defined set of rules, accepted and adopted by several organizations
C) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
D) A document that records a high-level principle or course of action that has been decided on
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
How the organization will deal with the situation covered by the policy is specified in the

A) Statement
B) Enforcement
C) Overview
D) Scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Who or what is covered by the policy is specified in the

A) Overview
B) Statement
C) Enforcement
D) Scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
It is generally advised to consolidate all policy issues into one policy document
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
The first section of a policy generally specifies

A) Who or what is covered by the policy
B) Any definitions used in the policy
C) The statement of the policy
D) The need for the policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
The sections of a policy are generally written in the sequence

A) Overview, scope, definitions, statement, enforcement
B) Definitions, overview, scope, statement, enforcement
C) Overview, definitions, statement, scope, enforcement
D) Overview, enforcement, scope, definitions, statement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Activities, settings and measurements accepted by all firms in an industry are

A) Global policies
B) General guidelines
C) Acceptable use policies
D) Industry standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
A guideline is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A defined set of rules, accepted and adopted by several organizations
D) A document that records a high-level principle or course of action that has been decided on
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
In the United States one of the primary sources of standards for information security concerns is the

A) National Institute of Standards and Technology
B) Massachusetts Institute of Technology
C) Harvard University
D) US State Department
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Policies, standards and guidelines are useful because they

A) Allow security administrators to obtain executive level endorsement for security objectives
B) Keep managers busy generating documents
C) Allow security administrators to educate the organization's leadership about information security
D) Help in detecting information security incidents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Security policies serve all the following functions except

A) Conveying organizational priorities
B) Obtaining managerial backing
C) Evading responsibility
D) Ensuring organizational consistency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
A policy is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so
B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources
C) A document that records a high-level principle or course of action that has been decided on
D) A defined set of rules, accepted and adopted by several organizations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
From the perspective of information security, the Sarbanes-Oxley SOX act defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
From the perspective of information security, the Family Educational Rights and Privacy FERPA act defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
From the perspective of information security, the Gramm-Leach-Bliley GLB act defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Safeguards that covered entities must use to protect the confidentiality, integrity and availability of electronic protected health information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
From the perspective of information security, export control laws defines

A) Requirements for financial institutions to protect the privacy of their customers' non-public, personal information
B) Protections for the privacy of student education records
C) The responsibilities of top executives of publicly traded companies for the accuracy and timeliness of financial data
D) Prohibitions regarding the unlicensed export of specified materials or information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Key information security issues for which an organization should have policies include all of the following except

A) Employee count
B) Incident response
C) Acceptable use
D) Information classification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.