IS4550 CHAPTER 7 Flashcards
The approach of using multiple layers of security to protect against a single point is called ___.
DEFENSE IN DEPTH
A person with enthusiasm for a cause or project and often gains acceptance for a project from a wide audience is called ___.
EVANGELIST
The practice and science of classification and hierarchical ___ is a tree structure of classifications for a given set of objects or documents is called ___.
TAXONOMY
- When writing policies and standards, you should address the six key questions who, what, where, when, why and how.
TRUE OR FALSE
TRUE
- All policy and standards libraries follow a universal numbering scheme for consistency between organizations.
TRUE OR FALSE
FALSE
- Guideline documents are often tied to a specific control standard.
TRUE OR FALSE
TRUE
- Which of the following is not an administrative control?
- Development of policies, standards, procedures, and guidelines
- Screening of personnel
- Change control procedures
- Logical access control mechanisms
Logical access control mechanisms
- Which of the following are common steps taken in the development of documents such as security policies, standards, and procedures?
- Design, development, publication, coding, and testing
- Feasibility, development, approval, implementation and integration
- Initiation, evaluation, development, approval, publication, implementation, and maintenance
- Design, coding, evaluation, approval, publication, and implementation
Initiation, evaluation, development, approval, publication, implementation, and maintenance
- Which departments should review policies and standards before official approval? (Select four)
- Technical
- Legal
- HR
- Maintenance
- Audit
Technical
Legal
HR
Audit
- Controls are implemented to do which of the following?
- Create new standards
- Protect systems from attacks on the confidentiality, integrity, and availability of the system
- Eliminate all risk and eliminate the potential for loss
- Support guidelines
Protect systems from attacks on the confidentiality, integrity, and availability of the system
- Which type of control is associated with responding to and fixing a security incident?
- Deterrent
- Compensating
- Corrective
- Detective
Corrective
- List examples of physical security control items.
Devices and processes used to control physical access Fences Security guards Locked doors Motion detectors Alarms
- Security ___ are the technical implementations of the policies defined by the organization.
Procedures
- A(n) ___ is a plan or course of action used by an organization to convey instructions from its senior-most management to those who make decisions, take actions, and perform other duties on behalf of the organization.
Policy
- The principle that states security is improved when it is implemented as a series of overlapping controls is called ___.
Defense in depth