IS3350 CHAPTER 13 Flashcards

1
Q

This states the proper use of an organization’s information technology resources and is called ___?

A

ACCEPTABLE USE POLICY (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process through which a user proves his or her identity to access an information technology resource is called ___?

A

AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A minimum level of behavior or action that must be met in order to comply with a governance document. These are often specified in standards and are called ___?

A

BASELINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization’s governing body. It plans an organization’s strategic direction and is required by law to act with due care and in the best interests of the organization. This body is called ___?

A

BOARD OF DIRECTOR (BOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization’s senior information technology official. This role focuses on developing an organizations own IT resources. This position is called ___?

A

CHIEF INFORMATION OFFICER (CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization’s senior information security official is called the ___?

A

CHIEF INFORMATION SECURITY OFFICER (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization’s most senior technology official. This role focuses on developing an organization’s technology products. This position is called ___?

A

CHIEF TECHNOLOGY OFFICER (CTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This/these states how data is to be destroyed when it reaches the end of its life cycle and is called ___?

A

DATA DESTRUCTION POLICIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This/these states how data is to be controlled controlled throughout its life cycle and is called ___?

A

DATA RETENTION POLICIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recommended actions and operational guides to users, IT staff, operations staff, and others when a specific standard doesn’t apply is called ___?

A

GUIDELINES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Executive management’s responsibility to provide strategic direction, oversight, and accountability for an organization’s information and information systems resources is called ___?

A

INFORMATION SECURITY GOVERNANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How an organization manages its day-to-day security activities. It makes sure that the policies dictated by the executive management team as part of its governance function are properly implemented is called ____?

A

INFORMATION SECURITY MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The day-to-day planning of a business is called ___?

A

OPERATIONAL PLANNING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An organization’s high-level statement of information security direction and goals. These are the highest level governance documents and are called ____?

A

POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The detailed step-by-step tasks, or checklists, that should be performed to achieve a certain goal or task. These are the lowest level governance documents and called ___?

A

PROCEDURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

People that are affected by a policy, standard, guideline, or procedure. These are people who have an interest in a policy document and are called ___?

A

STAKEHOLDERS

17
Q

Mandatory activities, actions, or rules that must be met in order to achieve policy goals. These are usually technology neutral and are called ___?

A

STANDARDS

18
Q

Long-term business planning is called ___?

A

STRATEGIC PLANNING

19
Q

Short- to medium-term business planning is called ___?

A

TACTICAL PLANNING

20
Q

A method of authentication that requires a user to prove their identity in two or more ways is called ___?

A

TWO-FACTOR AUTHENTICATION

21
Q

Pieces of information used to access information technology resources. These include passwords, personal identification numbers (PINs), tokens, smart cards, and biometric data and are called ___?

A

USER CREDENTIALS

22
Q
  1. What is a policy?
  2. An overall statement of information security scope and direction
  3. A minimum threshold of information security controls that must be implemented
  4. A checklist of steps that must be completed to ensure information security
  5. A technology-dependent statement of best practices
  6. Recommended actions and operational guidelines
A

An overall statement of information security scope and direction

23
Q
  1. What is information security governance?
A

Executive management providing strategic direction, oversight, and accountability for an organization’s data and IT resources.

24
Q
  1. What type of policy would an organization use to forbid its employees from using organizational email for personal use?
  2. Privacy policy
  3. Intellectual property policy
  4. Anti-harassment policy
  5. Acceptable use policy
  6. Monitoring policy
A

Acceptable use policy

25
Q
  1. What is software piracy?
  2. Unauthorized copying of software
  3. Unauthorized distribution of software
  4. Unauthorized use of software properly purchased by an organization
  5. None of the above
  6. 1 & 2
A

Unauthorized copying of software

Unauthorized distribution of software

26
Q
  1. What is information security management?
A

Middle management providing day-to-day guidance and oversight for an organization’s information and information resources.

27
Q
  1. Employer monitoring can be a normal term of employment if advance notice is given?
    TRUE OR FALSE
A

TRUE

28
Q
  1. What is a standard?
A

A list of mandatory activities that must be completed to achieve an information security goal.

29
Q
  1. Which law states requirements for federal agency information security governance?
  2. FISMA
  3. FERPA
  4. HIPAA
  5. GLBA
  6. FIPPS
A

FISMA

30
Q
  1. A guideline is a list of mandatory activities that must be completed to achieve an information security goal.
    TRUE OR FALSE
A

FALSE

31
Q
  1. Which role is the senior most information technology official in an organization?
  2. CFO
  3. CISO
  4. CTO
  5. CIO
  6. None of the above
A

CIO

32
Q
  1. What is a procedure?
A

A checklist of actions that should be performed to achieve a certain goal.

33
Q
  1. Which management layer has overall responsibility for information security governance?
  2. CIO
  3. CISO
  4. Board of directors
  5. Employees
  6. Information security managers
A

Board of directors

34
Q
  1. What is the final step in the policy development process?
  2. Maintenance and review
  3. Management review
  4. Continued awareness activities
  5. Communication to employees
  6. Stakeholder review
A

Maintenance and review

35
Q
  1. What factors drive data retention policies?
  2. Legal requirements
  3. Business need for information
  4. Historical need for information
  5. Storage space requirements
  6. All the above
A

Legal requirements
Business need for information
Historical need for information
Storage space requirements

All the above

36
Q
  1. What is a valid reason for allowing an information security policy exception?
  2. The cost of implementing security policy is too high
  3. The cost of compliance with the policy is more than the cost of noncompliance
  4. It is’t technically feasible to implement the policy
  5. End users believe that the policy makes their work harder
  6. It is too difficult to implement the policy
A

The cost of compliance with the policy is more than the cost of noncompliance