. (TCO 1) Which of the following is LEAST likely to lead to employees accepting and following policy?(Points : 4) Introduce policies through training programs.
Make policy compliance part of job descriptions.
Consistently enforce policies.
Seek input from the organization when developing policies.
Make policy compliance part of job descriptions.
Consistently enforce policies.
Seek input from the organization when developing policies.
Encryption Improper access controls Social engineering |
All full- and part-time employees of Acme Manufacturing and its subsidiaries The Acme Manufacturing board of directors The finance, human resources, and marketing departments of Acme Manufacturing |
Procedures must be changed every 30 days. Procedures are a prerequisite to developing a policy; they must exist before you can write a policy. Procedures are suggestions for the best way to accomplish a certain task. |
Give everyone a copy of the policy after it is written. Ensure it is detailed enough that everyone will understand it. Hold meetings to explain it. |
Running a password-cracking utility against a web server Dressing up as a UPS employee and gaining access to sensitive areas of a business Posing as a potential customer in a bank and gaining access to a computer terminal by pretending to need to send an e-mail |
the same as “management by walking around.” something that should only be employed when information security policies are new. the most effective leadership style, especially in relation to information security. |
|
The same penalty should apply each time an infraction occurs. The penalty should be proportional to the level of risk incurred as a result of the infraction. Penalties should be at the discretion of management. |
making sure the data are always available when legitimately needed. protecting the data from intentional or accidental modification. making sure the data are always transmitted in encrypted format. |
Comply with applicable government policy. Secure and protect assets from foreseeable harm and provide flexibility for the unforeseen. Approved by management, and understood by everyone |
GLBA HIPAA SOX |
Procedures Guidelines Policies |
data authentication. data confidentiality. data availability. |
| Question 15. 15. (TCO 1) Which of the following is a good way to help ensure that your company’s information security policies represent best practices? (Points : 4) |
Base them on current industry standards for practices and technology.
Provide little or no opportunity for policy exceptions to be granted.
Copy key parts of similar policies you find on the Internet.
Keep the suggested guidelines to a minimum, and focus on mandatory standards.
Provide little or no opportunity for policy exceptions to be granted.
Copy key parts of similar policies you find on the Internet.
Keep the suggested guidelines to a minimum, and focus on mandatory standards.
No comments:
Post a Comment