Review Questions - SYS701 - 16 - Security Governance and Compliance
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Joe is authoring a document that explains to system administrators one way in which they might comply with the organization's requirement to encrypt all laptops. What type of document is Joe writing?

  • Policy
  • Guideline (correct)
  • Procedure
  • Standard

Which one of the following statements is not true about compensating controls under PCI DSS?

  • Controls used to fulfill one PCI DSS requirement may be used to compensate for the absence of a control needed to meet another requirement. (correct)
  • Controls must meet the intent of the original requirement.
  • Controls must meet the rigor of the original requirement.
  • Compensating controls must provide a similar level of defense as the original requirement.

What law creates privacy obligations for those who handle the personal information of European Union residents?

  • HIPAA
  • FERPA
  • GDPR (correct)
  • PCI DSS

Which one of the following is not one of the five core security functions defined by the NIST Cybersecurity Framework?

<p>Contain (B)</p> Signup and view all the answers

What ISO standard provides guidance on privacy controls?

<p>27701 (C)</p> Signup and view all the answers

Which one of the following documents must normally be approved by the CEO or similarly high-level executive?

<p>Policy (D)</p> Signup and view all the answers

Greg would like to create an umbrella agreement that provides the security terms and conditions for all future work that his organization does with a vendor. What type of agreement should Greg use?

<p>MSA (C)</p> Signup and view all the answers

What organization is known for creating independent security benchmarks covering hardware and software platforms from many different vendors?

<p>Center for Internet Security (B)</p> Signup and view all the answers

What do many organizations use to schedule and coordinate changes for information systems?

<p>Maintenance windows (C)</p> Signup and view all the answers

Which one of the following would not normally be found in an organization's information security policy?

<p>Requirement to use AES-256 encryption (B)</p> Signup and view all the answers

Alice, an IT security manager at Acme Corporation, decides to conduct an exercise to test the employees' ability to recognize phishing emails. She creates fake phishing messages and sends them to the employees. When employees click on the links in the fake messages, they are redirected to a training program. What is the primary purpose of the exercise that Alice is conducting?

<p>To test employees' ability to recognize phishing messages and help them improve (C)</p> Signup and view all the answers

Tonya discovers that an employee is running a side business from his office, using company technology resources. What policy would most likely contain information relevant to this situation?

<p>AUP (B)</p> Signup and view all the answers

What compliance obligation applies to merchants and service providers who work with credit card information?

<p>PCI DSS (D)</p> Signup and view all the answers

Mike is an information security manager at TechRise Solutions. The company has been experiencing an increase in security incidents, and senior management is concerned about the security posture of the organization. They have asked Mike to take proactive measures to strengthen the company's security culture. What should be Mike's primary role in enhancing the security awareness and training at TechRise Solutions?

<p>To establish, promote, and maintain security training and awareness programs (B)</p> Signup and view all the answers

Colin would like to implement a security control in his accounting department that is specifically designed to detect cases of fraud that are able to occur despite the presence of other security controls. Which one of the following controls is best suited to meet Colin's need?

<p>Mandatory vacations (D)</p> Signup and view all the answers

Which one of the following security policy framework components does not contain mandatory guidance for individuals in the organization?

<p>Guideline (D)</p> Signup and view all the answers

Rachel is the Head of Security at WebCraft Inc. She wants to create both security training and awareness programs. Which statement best captures the difference between these programs?

<p>Security training requires time to learn new material, whereas awareness efforts use techniques like posters and emails to remind employees of security lessons. (A)</p> Signup and view all the answers

Allan is developing a document that lists the acceptable mechanisms for securely obtaining remote administrative access to servers in his organization. What type of document is Allan writing?

<p>Standard (B)</p> Signup and view all the answers

Which one of the following is not a common use of the NIST Cybersecurity Framework?

<p>Create specific technology requirements for an organization. (D)</p> Signup and view all the answers

Which one of the following items is not normally included in a request for an exception to security policy?

<p>Proposed revision to the security policy (C)</p> Signup and view all the answers

Flashcards

Capital of France (example flashcard)

Paris

More Like This

Use Quizgecko on...
Browser
Browser