Chapter 1 - Information Systems Security Policy Management
Answers
C
| |
Standards
| |
A
| |
D and E
| |
Procedure
| |
D
| |
C
| |
Human
| |
E
| |
B
| |
E
|
John works in the accounting department but travels to other company locations. He must present the past quarter's figures to the chief executive officer (CEO) in the morning. He forgot to update the PowerPoint presentation on his desktop computer at the main office. What is at issue here?
| ||
Governance is the practice of ensuring an entity is in conformance to policies, regulations, ________, and procedures.
| ||
COBIT is a widely accepted international best practices policy framework.
| ||
Which of the following are generally accepted as IA tenets but not ISS tenets? (Select two.)
| ||
Greg has developed a document on how to operate and back up the new financial sections storage area network. In it, he lists the steps required for powering up and down the system as well as configuring the backup tape unit. Greg has written a ________.
| ||
When should a wireless security policy be initially written?
| ||
A toy company is giving its Web site a much-needed facelift. The new Web site is ready to be deployed. It's late October, and the company wants to have the site ready for the holiday rush. The year-end holiday season accounts for 80 percent of its annual revenue. What process would be of particular importance to the toy company at this time?
| ||
Implementation and enforcement of policies is a challenge. The biggest hindrance to implementation of policies is the ________ factor.
| ||
Information systems security policies should support business operations. These policies focus on providing consistent protection of information in the system. This happens by controlling multiple aspects of the information system that directly or indirectly affect normal operations at some point. While there are many different benefits to supporting operations, some are more prevalent than others. Which of the following are aspects of ISS policies that extend to support business operations?
| ||
Ted is an administrator in the server backup area. He is reviewing the contract for the offsite storage facility for validity. This contract includes topics such as the amount of storage space required, the pickup and delivery of media, response times during an outage, and security of media within the facility. This contract is an example of information security.
| ||
A weakness is found in a system's configuration which could expose client data to unauthorized users. Which of the following best describes the problem?
|
Answers
C
| |
Standards
| |
A
| |
D and E
| |
Procedure
| |
D
| |
C
| |
Human
| |
E
| |
B
| |
E
|
Comments
Post a Comment