Governance and Compliance Flashcards
5.1 - Summarize elements of effective security governance 5.4 - Summarize elements of effective security compliance
Which of the following are key aspects of effective security governance? (Choose Three)
A. Risk Management
B. Strategic Alignment
C. Employee Satisfaction
D. Performance Measurement
Answer: A, B, D
Explanation:
A. Risk Management: Governance involves identifying, assessing, and managing risks to ensure organizational security.
B. Strategic Alignment: Governance ensures that IT strategies align with the organization’s overall business objectives.
D. Performance Measurement: Governance includes mechanisms to monitor and measure the performance of IT processes.
C. Employee Satisfaction: While important, this is not a primary focus of governance frameworks.
Which of the following best describes the role of governance in an organization?
A. Governance focuses solely on technical IT infrastructure.
B. Governance establishes a strategic framework for managing IT resources and aligning them with business goals.
C. Governance is only concerned with compliance with laws and regulations.
D. Governance does not influence organizational policies or procedures.
Answer: B
Explanation:
B. Governance establishes a strategic framework for managing IT resources and aligning them with business goals. This is the primary role of governance, as it ensures that IT operations support the organization’s objectives.
A, C, D: These options are incorrect because governance is broader than just technical infrastructure or compliance and directly influences policies and procedures.
Which of the following governance structures is responsible for setting the strategic direction of an organization?
A. Committees
B. Government Entities
C. Boards of Directors
D. Centralized Structures
Answer: C
Explanation:
C. Boards of Directors: They are responsible for setting the strategic direction and making significant decisions for the organization.
A. Committees: These are typically responsible for specific tasks or areas but not overall strategic direction.
B. Government Entities: These are external bodies that may influence governance but do not set internal strategic direction.
D. Centralized Structures: These refer to organizational structures, not decision-making bodies.
Which of the following is NOT a key element of governance frameworks?
A. Risk Management
B. Resource Management
C. Employee Training
D. Performance Measurement
Answer: C
Explanation:
C. Employee Training: While important, it is not a core element of governance frameworks.
A, B, D: These are all key elements of governance, as they involve managing risks, resources, and performance.
Which of the following are reasons why compliance is important for an organization? (Choose Three)
A. Legal Obligations
B. Employee Satisfaction
C. Trust and Reputation
D. Data Protection
Answer: A, C, D
Explanation:
A. Legal Obligations: Compliance ensures adherence to laws and regulations, avoiding penalties like fines and sanctions.
C. Trust and Reputation: Compliance enhances an organization’s reputation and fosters trust among customers and partners.
D. Data Protection: Compliance helps prevent data breaches and protects sensitive information.
B. Employee Satisfaction: While important, it is not a primary reason for compliance.
Which of the following policies outlines steps to ensure an organization can continue operations during and after a disruption?
A. Acceptable Use Policy (AUP)
B. Business Continuity Policy
C. Change Management Policy
D. Software Development Lifecycle (SDLC) Policy
Answer: B
Explanation:
B. Business Continuity Policy: This policy focuses on ensuring the organization can continue operations during and after disruptions.
A. Acceptable Use Policy (AUP): This defines acceptable use of IT resources.
C. Change Management Policy: This governs how changes to IT systems are managed.
D. Software Development Lifecycle (SDLC) Policy: This outlines processes for software development.
Which of the following is an example of a global governance consideration?
A. A local city ordinance prohibiting certain types of businesses
B. A state regulation on consumer data privacy
C. A national law requiring accessibility for people with disabilities
D. A European regulation affecting data collection practices worldwide
Answer: D
Explanation:
D. A European regulation affecting data collection practices worldwide: This is a global consideration because it impacts organizations beyond the region where the regulation was created.
A, B, C: These are local, state, or national considerations, not global.
Which of the following is a consequence of non-compliance? (Choose Two)
A. Fines and Sanctions
B. Employee Bonuses
C. Reputational Damage
D. Increased Customer Trust
Answer: A, C
Explanation:
A. Fines and Sanctions: Non-compliance can lead to legal penalties.
C. Reputational Damage: Non-compliance can harm an organization’s reputation.
B, D: These are not consequences of non-compliance.
Which of the following is a high-level guideline that outlines an organization’s commitment to data protection?
A. Password Standards
B. Information Security Policy
C. Change Management Procedures
D. Playbooks
Answer: B
Explanation:
B. Information Security Policy: This is a high-level guideline that outlines the organization’s commitment to protecting data.
A. Password Standards: These are specific rules, not high-level guidelines.
C. Change Management Procedures: These are step-by-step instructions, not high-level guidelines.
D. Playbooks: These are detailed guides for specific tasks, not high-level policies.
Which of the following standards ensures that only authorized individuals can access specific resources?
A. Password Standards
B. Access Control Standards
C. Physical Security Standards
D. Encryption Standards
Answer: B
Explanation:
B. Access Control Standards: These ensure that only authorized individuals can access specific resources.
A. Password Standards: These govern the creation and management of passwords.
C. Physical Security Standards: These focus on securing physical assets.
D. Encryption Standards: These govern the use of encryption to protect data.
Which of the following procedures involves disabling access to systems and conducting exit interviews?
A. Onboarding
B. Offboarding
C. Change Management
D. Playbooks
Answer: B
Explanation:
B. Offboarding: This procedure involves tasks like disabling access and conducting exit interviews when an employee leaves the organization.
A. Onboarding: This involves setting up access for new employees.
C. Change Management: This governs changes to IT systems.
D. Playbooks: These are guides for specific tasks or scenarios.
Which of the following concepts involves ensuring that an organization has taken reasonable steps to comply with regulations?
A. Due Diligence
B. Attestation
C. Automation
D. Acknowledgment
Answer: A
Explanation:
A. Due Diligence: This involves taking reasonable steps to ensure compliance with regulations.
B. Attestation: This is a formal declaration of compliance.
C. Automation: This refers to using tools to streamline compliance processes.
D. Acknowledgment: This is a general term and not specific to compliance.
Which of the following is a benefit of using automation in compliance processes?
A. Increased manual errors
B. Reduced efficiency
C. Streamlined monitoring and reporting
D. Higher costs
Answer: C
Explanation:
C. Streamlined monitoring and reporting: Automation helps streamline compliance processes, making them more efficient and accurate.
A, B, D: These are not benefits of automation.
Which of the following best describes the role of governance in an organization’s IT infrastructure?
A. Governance focuses solely on technical IT operations.
B. Governance establishes a strategic framework to align IT with business objectives and regulatory requirements.
C. Governance is only concerned with compliance with laws and regulations.
D. Governance does not influence the creation of policies or procedures.
Answer: B
Explanation:
B. Governance establishes a strategic framework to align IT with business objectives and regulatory requirements. This is the primary role of governance, as it ensures that IT operations support the organization’s goals and comply with regulations.
A, C, D: These options are incorrect because governance is broader than just technical operations or compliance and directly influences policies and procedures.
Which of the following are key components of the GRC triad? (Choose Three)
A. Governance
B. Risk Management
C. Compliance
D. Employee Training
Answer: A, B, C
Explanation:
A. Governance: This involves strategic leadership and decision-making to align IT with business objectives.
B. Risk Management: This involves identifying, assessing, and managing risks to the organization.
C. Compliance: This ensures adherence to laws, regulations, and standards.
D. Employee Training: While important, it is not part of the GRC triad.
Which of the following is a primary purpose of governance in an organization?
A. To manage employee salaries and benefits
B. To establish a strategic framework that aligns IT with business objectives and regulatory requirements
C. To focus solely on technical IT infrastructure
D. To replace the need for compliance
Answer: B
Explanation:
B. To establish a strategic framework that aligns IT with business objectives and regulatory requirements. This is the primary purpose of governance.
A, C, D: These options are incorrect because governance does not focus on employee salaries, technical infrastructure alone, or replace compliance.
Which of the following does governance directly influence? (Choose Three)
A. Guidelines
B. Policies
C. Employee Satisfaction
D. Procedures
Answer: A, B, D
Explanation:
A. Guidelines: Governance provides recommended approaches for handling situations.
B. Policies: Governance drives the development of high-level guidelines outlining organizational commitments.
D. Procedures: Governance ensures that procedures align with organizational objectives.
C. Employee Satisfaction: While important, this is not directly influenced by governance.
Which of the following is an example of how governance adapts to changes in the industry?
A. Ignoring new regulations to save costs
B. Updating policies and procedures to address new technologies, regulations, or cultural shifts
C. Eliminating compliance requirements to streamline operations
D. Focusing solely on technical IT infrastructure without considering business objectives
Answer: B
Explanation:
B. Updating policies and procedures to address new technologies, regulations, or cultural shifts. Governance must adapt to changes to remain effective.
A, C, D: These options are incorrect because governance does not ignore regulations, eliminate compliance, or focus solely on technical infrastructure.
Which of the following is a key responsibility of governance in risk management?
A. Ignoring potential risks to focus on business growth
B. Identifying, assessing, and managing potential risks to the organization
C. Delegating risk management entirely to IT teams
D. Eliminating all risks to ensure zero vulnerabilities
Answer: B
Explanation:
B. Identifying, assessing, and managing potential risks to the organization. This is a key responsibility of governance in risk management.
A, C, D: These options are incorrect because governance does not ignore risks, delegate risk management entirely, or aim to eliminate all risks (which is impossible).
Which of the following is an example of governance influencing standards?
A. Creating high-level guidelines for ethical conduct
B. Defining mandatory rules for password complexity
C. Providing step-by-step instructions for onboarding new employees
D. Conducting employee satisfaction surveys
Answer: B
Explanation:
B. Defining mandatory rules for password complexity. Standards are specific, mandatory rules that must be followed to adhere to policies.
A. Creating high-level guidelines for ethical conduct: This is an example of policy development, not standards.
C. Providing step-by-step instructions for onboarding new employees: This is an example of procedures, not standards.
D. Conducting employee satisfaction surveys: This is unrelated to governance influencing standards.
Which of the following is a reason why governance must adapt to changes in technology, regulations, and industry culture?
A. To avoid monitoring and revision of the governance framework
B. To ensure the governance framework remains effective and relevant
C. To eliminate the need for compliance
D. To focus solely on technical IT infrastructure
Answer: B
Explanation:
B. To ensure the governance framework remains effective and relevant. Governance must adapt to changes to address gaps or weaknesses and maintain effectiveness.
A, C, D: These options are incorrect because governance requires monitoring and revision, does not eliminate compliance, and is broader than just technical infrastructure.
Which of the following is an example of governance influencing procedures?
A. Creating a high-level policy on data protection
B. Defining mandatory encryption standards
C. Providing step-by-step instructions for secure remote access
D. Conducting risk assessments
Answer: C
Explanation:
C. Providing step-by-step instructions for secure remote access. Procedures are detailed steps to accomplish specific tasks, influenced by governance.
A. Creating a high-level policy on data protection: This is an example of policy development, not procedures.
B. Defining mandatory encryption standards: This is an example of standards, not procedures.
D. Conducting risk assessments: This is part of risk management, not procedures.
Which of the following is a key activity in monitoring governance effectiveness?
A. Ignoring changes in technology and regulations
B. Regularly reviewing and assessing the governance framework
C. Eliminating compliance requirements
D. Delegating governance entirely to external consultants
Answer: B
Explanation:
B. Regularly reviewing and assessing the governance framework. Monitoring involves evaluating the effectiveness of governance and identifying gaps or weaknesses.
A, C, D: These options are incorrect because governance requires active monitoring, does not eliminate compliance, and is not delegated entirely to external consultants.
Which of the following best describes the role of a board of directors in an organization?
A. Managing day-to-day operations of the organization
B. Setting the organization’s strategic direction and making significant decisions
C. Enforcing laws and regulations for compliance
D. Focusing solely on technical IT infrastructure
Answer: B
Explanation:
B. Setting the organization’s strategic direction and making significant decisions. This is the primary role of a board of directors.
A. Managing day-to-day operations: This is the responsibility of management, not the board.
C. Enforcing laws and regulations: This is the role of government entities, not the board.
D. Focusing solely on technical IT infrastructure: This is not the board’s role.
Which of the following are examples of committees within a board of directors? (Choose Two)
A. Audit Committee
B. Marketing Team
C. Governance Committee
D. IT Support Team
Answer: A, C
Explanation:
A. Audit Committee: Oversees financial reporting and compliance.
C. Governance Committee: Ensures the board functions effectively and adheres to governance principles.
B. Marketing Team: This is not a committee within a board of directors.
D. IT Support Team: This is not a committee within a board of directors.
Which of the following is a key characteristic of a centralized governance structure?
A. Decision-making authority is distributed throughout the organization.
B. Decision-making authority is concentrated at the top levels of management.
C. It allows for quick responses to local or departmental needs.
D. It often leads to inconsistencies in decision-making.
Answer: B
Explanation:
B. Decision-making authority is concentrated at the top levels of management. This is a key characteristic of centralized governance.
A. Decision-making authority is distributed throughout the organization: This describes a decentralized structure.
C. It allows for quick responses to local or departmental needs: This is a characteristic of decentralized structures.
D. It often leads to inconsistencies in decision-making: This is a characteristic of decentralized structures.
Which of the following is an example of a government entity that impacts organizational governance?
A. A company’s board of directors
B. The Federal Trade Commission (FTC)
C. A cybersecurity committee
D. A decentralized IT department
Answer: B
Explanation:
B. The Federal Trade Commission (FTC): This is a government entity that enforces laws related to consumer protection and competition, impacting organizational governance.
A. A company’s board of directors: This is an internal governance structure, not a government entity.
C. A cybersecurity committee: This is an internal committee, not a government entity.
D. A decentralized IT department: This is an internal organizational structure, not a government entity.
Which of the following are advantages of a decentralized governance structure? (Choose Two)
A. Consistent decision-making across the organization
B. Quicker decision-making at local or departmental levels
C. Clear lines of authority at the top levels of management
D. Greater responsiveness to local or departmental needs
Answer: B, D
Explanation:
B. Quicker decision-making at local or departmental levels: Decentralized structures allow for faster decision-making.
D. Greater responsiveness to local or departmental needs: Decentralized structures are more adaptable to local needs.
A. Consistent decision-making across the organization: This is an advantage of centralized structures.
C. Clear lines of authority at the top levels of management: This is an advantage of centralized structures.
Which of the following is a key responsibility of an audit committee within a board of directors?
A. Setting the organization’s strategic direction
B. Overseeing the organization’s financial reporting process
C. Managing cybersecurity risks
D. Enforcing consumer protection laws
Answer: B
Explanation:
B. Overseeing the organization’s financial reporting process: This is the primary responsibility of an audit committee.
A. Setting the organization’s strategic direction: This is the responsibility of the board of directors, not the audit committee.
C. Managing cybersecurity risks: This is the responsibility of a cybersecurity committee.
D. Enforcing consumer protection laws: This is the responsibility of government entities, not the audit committee.
Which of the following is a disadvantage of a centralized governance structure?
A. Inconsistent decision-making across the organization
B. Slow response to local or departmental needs
C. Lack of clear lines of authority
D. Difficulty in enforcing compliance with regulations
Answer: B
Explanation:
B. Slow response to local or departmental needs: Centralized structures can be slower to respond to local needs due to the concentration of decision-making authority at the top.
A. Inconsistent decision-making across the organization: This is a disadvantage of decentralized structures.
C. Lack of clear lines of authority: Centralized structures have clear lines of authority.
D. Difficulty in enforcing compliance with regulations: This is not a specific disadvantage of centralized structures.
Which of the following is an example of a decentralized governance structure?
A. A large corporation with consistent policies across all departments
B. A tech startup that encourages innovation and agility
C. A government entity enforcing consumer protection laws
D. A board of directors setting strategic direction
Answer: B
Explanation:
B. A tech startup that encourages innovation and agility: Decentralized structures are often used in startups to allow for quick decision-making and adaptability.
A. A large corporation with consistent policies across all departments: This describes a centralized structure.
C. A government entity enforcing consumer protection laws: This is unrelated to governance structures within an organization.
D. A board of directors setting strategic direction: This is part of governance but not specific to decentralized structures.
Which of the following is a key function of a governance committee within a board of directors?
A. Overseeing financial reporting
B. Ensuring the board functions effectively and adheres to governance principles
C. Managing cybersecurity risks
D. Enforcing consumer protection laws
Answer: B
Explanation:
B. Ensuring the board functions effectively and adheres to governance principles: This is the primary function of a governance committee.
A. Overseeing financial reporting: This is the responsibility of an audit committee.
C. Managing cybersecurity risks: This is the responsibility of a cybersecurity committee.
D. Enforcing consumer protection laws: This is the responsibility of government entities.
Which of the following is a key difference between centralized and decentralized governance structures?
A. Centralized structures have distributed decision-making authority, while decentralized structures concentrate authority at the top.
B. Centralized structures are more responsive to local needs, while decentralized structures are slower to respond.
C. Centralized structures concentrate decision-making authority at the top, while decentralized structures distribute authority throughout the organization.
D. Centralized structures often lead to inconsistencies, while decentralized structures ensure consistency.
Answer: C
Explanation:
C. Centralized structures concentrate decision-making authority at the top, while decentralized structures distribute authority throughout the organization. This is the key difference between the two structures.
A, B, D: These options incorrectly describe the characteristics of centralized and decentralized structures.
Which of the following best describes the purpose of an Acceptable Use Policy (AUP)?
A. To outline the steps for recovering IT systems after a disaster
B. To define appropriate and prohibited use of an organization’s IT systems and resources
C. To govern how changes to IT systems are implemented
D. To ensure the confidentiality, integrity, and availability of data
Answer: B
Explanation:
B. To define appropriate and prohibited use of an organization’s IT systems and resources. This is the primary purpose of an AUP.
A. To outline the steps for recovering IT systems after a disaster: This describes a Disaster Recovery Policy.
C. To govern how changes to IT systems are implemented: This describes a Change Management Policy.
D. To ensure the confidentiality, integrity, and availability of data: This describes Information Security Policies.
Which of the following are key areas covered by Information Security Policies? (Choose Three)
A. Data Classification
B. Access Control
C. Employee Satisfaction
D. Encryption
Answer: A, B, D
Explanation:
A. Data Classification: Information Security Policies define how data is classified and protected.
B. Access Control: These policies specify who can access sensitive data and systems.
D. Encryption: Information Security Policies often require encryption to protect data in transit and at rest.
C. Employee Satisfaction: This is not a focus of Information Security Policies.
Which of the following policies focuses on ensuring an organization can continue critical operations during and after a disruption?
A. Acceptable Use Policy (AUP)
B. Business Continuity Policy
C. Disaster Recovery Policy
D. Incident Response Policy
Answer: B
Explanation:
B. Business Continuity Policy: This policy focuses on continuing critical operations during and after disruptions.
A. Acceptable Use Policy (AUP): This defines appropriate use of IT resources.
C. Disaster Recovery Policy: This focuses on recovering IT systems and data after a disaster.
D. Incident Response Policy: This outlines steps for handling security incidents.
Which of the following is a key component of a Disaster Recovery Policy?
A. Defining acceptable use of IT resources
B. Outlining steps for data backup and restoration
C. Governing how changes to IT systems are implemented
D. Ensuring employee satisfaction
Answer: B
Explanation:
B. Outlining steps for data backup and restoration: This is a key component of a Disaster Recovery Policy.
A. Defining acceptable use of IT resources: This is part of an AUP.
C. Governing how changes to IT systems are implemented: This is part of a Change Management Policy.
D. Ensuring employee satisfaction: This is not related to Disaster Recovery.
Which of the following policies includes steps for detecting, reporting, and responding to security incidents?
A. Business Continuity Policy
B. Incident Response Policy
C. Software Development Lifecycle (SDLC) Policy
D. Change Management Policy
Answer: B
Explanation:
B. Incident Response Policy: This policy outlines steps for handling security incidents, including detection, reporting, and response.
A. Business Continuity Policy: This focuses on continuing operations during disruptions.
C. Software Development Lifecycle (SDLC) Policy: This guides software development processes.
D. Change Management Policy: This governs changes to IT systems.
Which of the following is a key focus of a Software Development Lifecycle (SDLC) Policy?
A. Ensuring high-quality, secure software through secure coding practices
B. Defining acceptable use of IT resources
C. Outlining steps for data backup and restoration
D. Governing how changes to IT systems are implemented
Answer: A
Explanation:
A. Ensuring high-quality, secure software through secure coding practices: This is a key focus of an SDLC Policy.
B. Defining acceptable use of IT resources: This is part of an AUP.
C. Outlining steps for data backup and restoration: This is part of a Disaster Recovery Policy.
D. Governing how changes to IT systems are implemented: This is part of a Change Management Policy.
Which of the following policies governs how changes to IT systems and processes are handled?
A. Acceptable Use Policy (AUP)
B. Business Continuity Policy
C. Change Management Policy
D. Incident Response Policy
Answer: C
Explanation:
C. Change Management Policy: This policy governs how changes to IT systems and processes are implemented.
A. Acceptable Use Policy (AUP): This defines appropriate use of IT resources.
B. Business Continuity Policy: This focuses on continuing operations during disruptions.
D. Incident Response Policy: This outlines steps for handling security incidents.
Which of the following is a key benefit of having an Incident Response Policy?
A. Ensuring high-quality software development
B. Minimizing damage and downtime during security incidents
C. Defining acceptable use of IT resources
D. Outlining steps for data backup and restoration
Answer: B
Explanation:
B. Minimizing damage and downtime during security incidents: This is a key benefit of an Incident Response Policy.
A. Ensuring high-quality software development: This is a focus of an SDLC Policy.
C. Defining acceptable use of IT resources: This is part of an AUP.
D. Outlining steps for data backup and restoration: This is part of a Disaster Recovery Policy.