ITS 221 ch4-6

Exit

Question 1 of 1

  Time Left


0 [{"id":395610,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:16:54","updated_at":"2018-03-01 08:11:11","questionName":"The ________is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395603,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:13:40","updated_at":"2018-03-01 08:11:11","questionName":"To remain viable, security policies must have a responsible individual, a schedule of reviews, a method for making recommendations for reviews, and a policy issuance and planned revision date.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395595,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:12:07","updated_at":"2018-03-01 08:11:11","questionName":"The ISSP sets out the requirements that must be met by the information security blueprint or framework.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395592,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:11:36","updated_at":"2018-03-01 08:11:11","questionName":"A standard is a plan or course of action that conveys instructions from an organization's senior management to those who make decisions, take actions, and perform other duties.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395605,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:14:50","updated_at":"2018-03-01 08:11:11","questionName":"A(n) ________ plan is a plan for the organization’s intended strategic efforts over the next several years.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395602,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:13:21","updated_at":"2018-03-01 08:11:11","questionName":"ACLs are more specific to the operation of a system than rule-based policies and they may or may not deal with users directly.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395604,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:13:52","updated_at":"2018-03-01 08:11:11","questionName":"The policy administrator is responsible for the creation, revision, distribution, and storage of the policy.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395594,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:11:50","updated_at":"2018-03-01 08:11:11","questionName":"Good security programs begin and end with policy.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395596,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:12:22","updated_at":"2018-03-01 08:11:11","questionName":"You can create a single comprehensive ISSP document covering all information security issues.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395607,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:15:38","updated_at":"2018-03-01 08:11:11","questionName":"The goals of information security governance include all but which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395600,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:13:07","updated_at":"2018-03-01 08:11:11","questionName":"A managerial guidance SysSP document is created by the IT experts in a company to guide management in the implementation and configuration of technology.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395599,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:12:49","updated_at":"2018-03-01 08:11:11","questionName":"A policy should state that if employees violate a company policy or any law using company technologies, the company will protect them, and the company is liable for the employee's actions.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395609,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:16:16","updated_at":"2018-03-01 08:11:11","questionName":"Standards may be published, scrutinized, and ratified by a group, as in formal or ________standards.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395597,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:12:34","updated_at":"2018-03-01 08:11:11","questionName":"Each policy should contain procedures and a timetable for periodic review.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":395611,"quiz_id":"20043","answer_id":null,"answerType_id":"0","created_at":"2018-02-28 20:17:18","updated_at":"2018-03-01 08:11:11","questionName":"________often function as standards or procedures to be used when configuring or maintaining systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
395610
0
120
block

The ________is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts.

Select the correct answer(s).  

(0/0)












395603
0
120
none
395595
0
120
none
395592
0
120
none
395605
0
120
none
395602
0
120
none
395604
0
120
none
395594
0
120
none
395596
0
120
none
395607
0
120
none
395600
0
120
none
395599
0
120
none
395609
0
120
none
395597
0
120
none
395611
0
120
none