Chapter 1 - Information Systems Security Policy Management

Answers
1. 
C
2. 
Standards
3. 
A
4. 
D and E
5. 
Procedure
6. 
D
7. 
C
8. 
Human
9. 
E
10. 
B
11. 
E



John works in the accounting department but travels to other company locations. He must present the past quarter's figures to the chief executive officer (CEO) in the morning. He forgot to update the PowerPoint presentation on his desktop computer at the main office. What is at issue here?
  1. Unauthorized access to the system
  2. Integrity of the data
  3. Availability of the data
  4. Nonrepudiation of the data
  5. Unauthorized use of the system

Governance is the practice of ensuring an entity is in conformance to policies, regulations, ________, and procedures.

COBIT is a widely accepted international best practices policy framework.
  1. True
  2. False

Which of the following are generally accepted as IA tenets but not ISS tenets? (Select two.)
  1. Confidentiality
  2. Integrity
  3. Availability
  4. Authentication
  5. Nonrepudiation

Greg has developed a document on how to operate and back up the new financial sections storage area network. In it, he lists the steps required for powering up and down the system as well as configuring the backup tape unit. Greg has written a ________.

When should a wireless security policy be initially written?
  1. When the industry publishes new wireless standards
  2. When a vendor presents wireless solutions to the business
  3. When the next generation of wireless technology is launched
  4. After a company decides to implement wireless and before it is installed

A toy company is giving its Web site a much-needed facelift. The new Web site is ready to be deployed. It's late October, and the company wants to have the site ready for the holiday rush. The year-end holiday season accounts for 80 percent of its annual revenue. What process would be of particular importance to the toy company at this time?
  1. Continuous improvement
  2. Business process reengineering
  3. Change management
  4. Information security system life cycle

Implementation and enforcement of policies is a challenge. The biggest hindrance to implementation of policies is the ________ factor.

Information systems security policies should support business operations. These policies focus on providing consistent protection of information in the system. This happens by controlling multiple aspects of the information system that directly or indirectly affect normal operations at some point. While there are many different benefits to supporting operations, some are more prevalent than others. Which of the following are aspects of ISS policies that extend to support business operations?
  1. Controlling change to the IT infrastructure
  2. Protecting data at rest and in transit
  3. Protecting systems from the insider threat
  4. B and C only
  5. All the above

Ted is an administrator in the server backup area. He is reviewing the contract for the offsite storage facility for validity. This contract includes topics such as the amount of storage space required, the pickup and delivery of media, response times during an outage, and security of media within the facility. This contract is an example of information security.
  1. True
  2. False

A weakness is found in a system's configuration which could expose client data to unauthorized users. Which of the following best describes the problem?
  1. A new threat was discovered.
  2. A new vulnerability was discovered.
  3. A new risk was discovered.
  4. A and B
  5. B and C
  6. A, B, and C

Answers
1. 
C
2. 
Standards
3. 
A
4. 
D and E
5. 
Procedure
6. 
D
7. 
C
8. 
Human
9. 
E
10. 
B
11. 
E

Comments

Popular posts from this blog

Solar System Overview Questions and Answers

Extra Solar Planets Question and Answer

Chapter 3 - U.S. Compliance Laws and Information Security Policy Requirements