Que 1: A security policy would include all of the following EXCEPT
Que 2: All of the following are basic components of a security policy EXCEPT the
Que 3: Which one of the following is an important characteristic of an information security policy?
Que 4: Ensuring the integrity of business information is the PRIMARY concern of
Que 5: Which of the following would be the first step in establishing an information security program?
Que 6: Which of the following department managers would be best suited to oversee the development of an information security policy?
Que 7: What is the function of a corporate information security policy?
Que 8: Why must senior management endorse a security policy?
Que 9: In which one of the following documents is the assignment of individual roles and responsibilities MOST appropriately defined?
Que 10: Which of the following defines the intent of a system security policy?
Que 11: When developing an information security policy, what is the FIRST step that should be taken?
Que 12: Which one of the following should NOT be contained within a computer policy?
Que 13: Which one of the following is NOT a fundamental component of a Regulatory Security Policy?
Que 14: Which one of the following statements describes management controls that are instituted to implement a security policy?
1 out of 2
Que 15: Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
Ques 16: Which of the following choices is NOT part of a security policy?
Ques 17: In an organization, an Information Technology security function should:
Ques 18: Which of the following embodies all the detailed actions that personnel are required to follow?
Ques 19: A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include"
Ques 20: Network Security is a
Ques 21: Security is a process that is:
Ques 22: What are the three fundamental principles of security?
Ques 23: Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions over networks may be maintained?
Ques 24: Making sure that the data is accessible when and where it is needed is which of the following?
Ques 25: Which of the following describes elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?
Ques 26: Most computer attacks result in violation of which of the following security properties?
Ques 27: Which of the following are objectives of an information systems security program?
Ques 28: An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined as
Ques 29: The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and authentication, and confidentiality for transmissions over private and public communications networks and media includes:
2 out of 2
Ques 30: Which one of the following is the MOST crucial link in the computer security chain?