Chapter 3 - U.S. Compliance Laws and Information Security Policy Requirements




When creating laws and regulations, the government's sole concern is the privacy of the individual.
  1. True
  2. False

Which of the following are pressures on creating security policies?
  1. Shareholder value
  2. Regulations
  3. Technology vulnerabilities and limitations
  4. B and C only
  5. All of the above

Which of the following laws require proper security controls for handling privacy data?
  1. HIPAA
  2. GLBA
  3. FERPA
  4. B and C Only
  5. All of the above

Which of the following are control objectives for PCI DSS?
  1. Maintain an information security policy
  2. Protect cardholder data
  3. Alert when credit cards are illegally used
  4. A and B only
  5. None of the above

Nation-state attacks that try to disrupt the country's critical infrastructure are sometimes referred to as ________.

Health care providers are those that process and facilitate billing.
  1. True
  2. False

The law that attempts to limit children's exposure to sexually explicit material is ________.

The only consideration in protecting personal customer information is legal requirements.
  1. True
  2. False

You should always write new security policies each time a new regulation is issued.
  1. True
  2. False

What should you ask for to gain confidence that a vendor's security controls are adequate?
  1. An SSAE16 Type I audit
  2. An SSAE16 Type II audit
  3. A list of all internal audits
  4. All of the above

Why is it important to map regulatory requirements to policies and controls?
  1. To demonstrate compliance to regulators
  2. To ensure regulatory requirements are covered
  3. To demonstrate the importance of a security control
  4. All of the above

Who typically writes a report to the board of directors on the current state of information security within a company?
  1. Chief risk officer
  2. Chief information officer
  3. Chief information security officer
  4. A and B
  5. B and C
  6. A, B, and C




Answers
1. 
B
2. 
E
3. 
E
4. 
D
5. 
Cyberterrorism or cyberwarfare
6. 
B
7. 
CIPA
8. 
B
9. 
B
10. 
B
11. 
D
12. 
D

Comments

Popular posts from this blog

Solar System Overview Questions and Answers

Extra Solar Planets Question and Answer