Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management of Information Security
Quiz 4: Information Security Policy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Access control lists can be used to control access to file storage systems.
Question 22
True/False
To be effective,policy must be uniformly applied to all employees,including executives.
Question 23
True/False
A(n)standard is a more detailed statement of what must be done to comply with a
policy
._________________________
Question 24
True/False
The policy administrator must be technically oriented.
Question 25
True/False
The Flesch-Kincaid Grade Level score evaluates writing on a U.S.grade-school level.
Question 26
True/False
If multiple audiences exist for information security policies,different documents must be created for each audience.
Question 27
True/False
The
Prohibited Usage of Equipment
section of the ISSP specifies the penalties and repercussions of violating the usage and systems management policies._________________________
Question 28
True/False
A(n)
individual
approach to creating the ISSPs can suffer from poor policy dissemination,enforcement,and review._________________________
Question 29
True/False
A policy should be "signed into law" by a high-level manager before the collection and review of employee input.
Question 30
True/False
A(n)
issue-specific
security policy sets the strategic direction,scope,and tone for all of an organization's security efforts._________________________
Question 31
True/False
Access control
lists include user access lists,matrices,and capability tables._________________________
Question 32
True/False
Policies should be published without a date of origin.
Question 33
True/False
An ISSP will typically not cover the use of e-mail or the Internet.
Question 34
True/False
The two general methods of implementing technical controls are access control lists and
configuration rules
._________________________
Question 35
True/False
A(n)
enterprise information
security policy is a type of information security policy that provides detailed,targeted guidance to instruct all members of the organization in the use of technology-based systems._________________________