Chapter 2 - Business Drivers for Information Security Policies
Answers
C
| |
A
| |
A
| |
Preventive
| |
C
| |
B
| |
D
| |
A
| |
D
| |
D
| |
A
| |
B
| |
B
| |
D
| |
D
|
What is policy compliance?
| ||
What is an automated control?
| ||
Which of the following is not a business driver?
| ||
A firewall is generally considered an example of a ________ control.
| ||
What is an information security policy?
| ||
Which of the following is not a type of security control?
| ||
Tone at the top refers to:
| ||
Privacy regulations involve two important principles: full disclosure and data encryption.
| ||
What are the benefits to having a security awareness program emphasize the business risk?
| ||
Which of the following is not a guideline to be considered when developing policy to secure PII date?
| ||
Information used to open or access a bank account is generally considered PII data.
| ||
Which of the following is not a benefit of having an acceptable use policy?
| ||
Mitigating controls always meet the full intent of the policy.
| ||
Which of the following do you need to measure to achieve operational consistency?
| ||
Well-defined and properly implemented security policies help the business in which of the following ways?
|
Answers
C
| |
A
| |
A
| |
Preventive
| |
C
| |
B
| |
D
| |
A
| |
D
| |
D
| |
A
| |
B
| |
B
| |
D
| |
D
|
Comments
Post a Comment