Chapter 2 - Business Drivers for Information Security Policies



Answers
1. 
C
2. 
A
3. 
A
4. 
Preventive
5. 
C
6. 
B
7. 
D
8. 
A
9. 
D
10. 
D
11. 
A
12. 
B
13. 
B
14. 
D
15. 
D



What is policy compliance?
  1. The effort to follow an organization's policy
  2. When customers read a Web site policy statement
  3. Adherence to an organization's policy
  4. Failure to follow to an organization's policy

What is an automated control?
  1. A control that stops behavior immediately and does not rely on human decisions
  2. A control that does not stop behavior immediately and relies on human decisions
  3. A control that does not stop behavior immediately but automates notification of incident
  4. A control that stops behavior immediately and relies on human decisions

Which of the following is not a business driver?
  1. Ability to acquire the newest technology
  2. Cost of maintaining controls
  3. Ability to legally defend
  4. Customer satisfaction

A firewall is generally considered an example of a ________ control.

What is an information security policy?
  1. A policy that defines acceptable behavior of a customer
  2. A policy that defines what hardware to purchase
  3. A policy that defines how to protect information in any form
  4. A policy that defines the type of uniforms guards should wear

Which of the following is not a type of security control?
  1. Preventative
  2. Correlative
  3. Detective
  4. Corrective

Tone at the top refers to:
  1. A company's leaders making sure every employee knows the priorities
  2. Senior leaders implementing and enforcing policies
  3. Senior managers building trust with the public and with regulators
  4. All of the above

Privacy regulations involve two important principles: full disclosure and data encryption.
  1. True
  2. False

What are the benefits to having a security awareness program emphasize the business risk?
  1. Risk becomes more relevant to employees
  2. Security policies are more likely to be followed
  3. Provides employees a foundation to deal with unexpected risk
  4. All of the above

Which of the following is not a guideline to be considered when developing policy to secure PII date?
  1. Align—Coordinate privacy policies with data classification policies
  2. Retain—Ensure proper controls around data retention and destruction
  3. Disclose—Fully disclose to the individual what data is being collected and how it will be used
  4. Resiliency—Policies provide guidelines for the unexpected

Information used to open or access a bank account is generally considered PII data.
  1. True
  2. False

Which of the following is not a benefit of having an acceptable use policy?
  1. Outlines disciplinary action for improper behavior
  2. Prevents employees from misusing the Internet
  3. Reduces business liability
  4. Defines proper behavior while using the Internet

Mitigating controls always meet the full intent of the policy.
  1. True
  2. False

Which of the following do you need to measure to achieve operational consistency?
  1. Consistency
  2. Quality
  3. Results
  4. All of the above

Well-defined and properly implemented security policies help the business in which of the following ways?
  1. Maximize profit
  2. Reduce risk
  3. Produce consistent and reliable products
  4. All of the above

Answers
1. 
C
2. 
A
3. 
A
4. 
Preventive
5. 
C
6. 
B
7. 
D
8. 
A
9. 
D
10. 
D
11. 
A
12. 
B
13. 
B
14. 
D
15. 
D

Comments

Popular posts from this blog

Solar System Overview Questions and Answers

Extra Solar Planets Question and Answer

Chapter 3 - U.S. Compliance Laws and Information Security Policy Requirements