Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management of Information Security
Quiz 4: Information Security Policy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
True/False
For policies to be effective,they must first be developed using
generally
-accepted practices._________________________
Question 42
True/False
The
EISP
guides the development,implementation,and management requirements of the information security program._________________________
Question 43
True/False
To ensure
due diligence
an organization must demonstrate that it is continuously attempting to meet the requirements of the market in which it operates._________________________
Question 44
True/False
During the
implementation
phase of the policy development SecSDLC,the development team creating the information security policy should make sure that the policy is written at a reasonable reading level._________________________
Question 45
True/False
A(n)
capability table
specifies which subjects and objects that users or groups can access._________________________
Question 46
True/False
A(n)
blow-by screen
is an organizational tool to ensure that all the appropriate information security policy messages are presented to all the appropriate audiences._________________________
Question 47
True/False
The
policy administrator
must be identified on the policy document as the primary contact for providing additional information or suggesting revisions to the policy._________________________
Question 48
True/False
The analysis phase of the SecSDLC in policy development should produce a new or recent
risk assessment
or IT audit documenting the current information security needs of the organization._________________________