Enterprise Information Security Policy Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an Access Control List (ACL)?

  • A table that lists the capabilities of a user or group
  • A policy that provides detailed guidance for the use of a specific resource or technology
  • A set of rules that define which users or groups are granted access to a particular resource (correct)
  • A high-level policy that sets the strategic direction for an organization's security efforts

What is a Capabilities Table?

  • A detailed policy that provides guidance for the use of a specific resource or technology
  • A high-level policy that sets the strategic direction for an organization's security efforts
  • A list of the access rights and privileges granted to a user or group (correct)
  • A matrix that integrates access control lists and capability tables

What is a Systems-Specific Security Policy (SysSP)?

  • A matrix that integrates access control lists and capability tables
  • A set of specifications that govern the rights and privileges of users to a particular information asset
  • A detailed policy that provides guidance for the use of a specific resource or technology (correct)
  • A high-level policy that sets the strategic direction for an organization's security efforts

What is an Access Control Matrix?

<p>An integration of access control lists and capability tables that results in a matrix with organizational assets and users (A)</p> Signup and view all the answers

What is an Enterprise Information Security Policy (EISP)?

<p>A high-level policy that sets the strategic direction, scope, and tone for all of an organization's security efforts (D)</p> Signup and view all the answers

Which type of security policy provides detailed, targeted guidance for the use of a specific resource or technology?

<p>Systems-Specific Security Policy (SysSP) (D)</p> Signup and view all the answers

What is a capabilities table in the context of access control?

<p>A list of user permissions associated with a particular subject (B)</p> Signup and view all the answers

What is the primary purpose of a Systems-Specific Security Policy (SysSP)?

<p>To express management's intent for the acquisition, implementation, configuration, and management of a particular technology (D)</p> Signup and view all the answers

What is the difference between managerial guidance and technical specifications in a SysSP?

<p>Managerial guidance is written from a business perspective, while technical specifications are written from a technical perspective (A)</p> Signup and view all the answers

What is the role of a policy administrator in an organization?

<p>To create, revise, distribute, and store policies (D)</p> Signup and view all the answers

What is the purpose of a sunset clause in a policy or law?

<p>To define the expected end date for the applicability of the policy or law (D)</p> Signup and view all the answers

Which of the following is a key component of a technical specifications SysSP?

<p>Configuration rules (D)</p> Signup and view all the answers

Which of the following is a type of security policy that management must define?

<p>Systems-Specific Security Policy (SysSP) (C)</p> Signup and view all the answers

What is the term used to describe the layered implementation of security?

<p>Defense in depth (A)</p> Signup and view all the answers

Which of the following is considered one of the least frequently implemented but most beneficial programs in an organization?

<p>Security awareness program (B)</p> Signup and view all the answers

What should be a driving force in the planning and governance activities of an organization?

<p>Enterprise information security policy (EISP) (A)</p> Signup and view all the answers

Which of the following describes the steps that must be taken to conform to policies?

<p>Standards (D)</p> Signup and view all the answers

What is the term used to describe a detailed security policy that addresses a specific issue or topic?

<p>Issue-specific security policy (A)</p> Signup and view all the answers

More Like This

Cyber 3
72 questions

Cyber 3

CourtlyErudition avatar
CourtlyErudition
Information Security Project Analysis Quiz
10 questions
Use Quizgecko on...
Browser
Browser