Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Firewalls and VPNs
Quiz 2: Security Policies and Standards
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Match each item with a statement below. -Published, scrutinized, and ratified by a group.
Question 22
Multiple Choice
Match each item with a statement below. -Set of rules for the protection of an organization's information assets.
Question 23
Multiple Choice
Establishing a contact number of hot line is an aspect of ____ planning.
Question 24
Short Answer
____________________ management differs dramatically from incident response, as it focuses first and foremost on the people involved.
Question 25
Short Answer
A(n) ____________________ is also known as a general security policy, an IT security policy, or an information security policy.
Question 26
Multiple Choice
A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.
Question 27
Short Answer
A(n) ____________________ is a set of specifications that identifies a piece of technology's authorized users and includes details on the rights and privileges those users have on that technology.
Question 28
Multiple Choice
Match each item with a statement below. -Basis for the design, selection, and implementation of all security program elements, including policy implementation, ongoing policy management, risk management programs, education and training programs, technological controls, and maintenance of the security program.
Question 29
Multiple Choice
Match each item with a statement below. -Informal part of an organization's culture.
Question 30
Multiple Choice
____ planning prepares an organization to reestablish critical business operations during a disaster that affects operations at the primary site.
Question 31
Multiple Choice
When disaster threatens the viability of the organization at the primary site, disaster recovery undergoes a transition into ____.
Question 32
Multiple Choice
Match each item with a statement below. -Investigation and assessment of the impact that various attacks can have on the organization.
Question 33
Multiple Choice
Match each item with a statement below. -Ensures that critical business functions continue if a catastrophic incident or disaster occurs.
Question 34
Multiple Choice
The analysis and prioritization of the business functions within the organization's departments, sections, divisions, groups, or other units to determine which are most vital to continued operations is called ____.