Filters
Question type

Study Flashcards

Policies are living documents that must be managed._________________________

A) True
B) False

Correct Answer

verifed

verified

Proxy servers can temporarily store a frequently visited Web page,and thus are sometimes called demilitarized servers._________________________

A) True
B) False

Correct Answer

verifed

verified

Quality security programs begin and end with policy.

A) True
B) False

Correct Answer

verifed

verified

A security ____________________ defines the boundary between the outer limit of an organization's security and the beginning of the outside world.

Correct Answer

verifed

verified

Standards may be published,scrutinized,and ratified by a group,as in formal or ____ standards.


A) de formale
B) de public
C) de jure
D) de facto

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A(n)honeynet is usually a computing device or a specially configured computer that allows or prevents access to a defined area based on a set of rules._________________________

A) True
B) False

Correct Answer

verifed

verified

A(n)_________________________ plan ensures that critical business functions continue if a catastrophic incident or disaster occurs.

Correct Answer

verifed

verified

business c...

View Answer

The security framework is a more detailed version of the security blueprint.

A) True
B) False

Correct Answer

verifed

verified

The ____ is based on and directly supports the mission,vision,and direction of the organization and sets the strategic direction,scope,and tone for all security efforts.


A) ISP
B) EISP
C) GSP
D) ISSP

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Technical controls are the tactical and technical implementations of security in the organization._________________________

A) True
B) False

Correct Answer

verifed

verified

You can create a single comprehensive ISSP document covering all information security issues.

A) True
B) False

Correct Answer

verifed

verified

NIST 800-14,The Principles for Securing Information Technology Systems,provides detailed methods for assessing,designing,and implementing controls and plans for applications of varying size.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____ plan deals with the identification,classification,response,and recovery from an incident.


A) CM
B) BC
C) DR
D) IR

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

RAID ____ drives can be hot swapped.


A) 2
B) 3
C) 4
D) 5

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Systems-specific security policies are formalized as written documents readily identifiable as policy._________________________

A) True
B) False

Correct Answer

verifed

verified

The spheres of ____ are the foundation of the security framework and illustrate how information is under attack from a variety of sources.


A) defense
B) assessment
C) security
D) information

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The stated purpose of ____ is to "give recommendations for information security management for use by those who are responsible for initiating,implementing,or maintaining security in their organization."


A) NIST SP800-18
B) RFC 2196
C) ISO/IEC 27002
D) BS7799 (Part 2)

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

To remain viable,security policies must have a responsible individual,a schedule of reviews,a method for making recommendations for reviews,and a policy issuance and planned revision date.

A) True
B) False

Correct Answer

verifed

verified

A disaster recovery plan addresses the preparation for and recovery from a disaster,whether natural or man-made.

A) True
B) False

Correct Answer

verifed

verified

The policy administrator is responsible for the creation,revision,distribution,and storage of the policy.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 108

Related Exams

Show Answer