Cybersecurity Management Quizzes
Enforcement of Gramm-Leach-Bliley Act (GLBA) was assigned to federal oversight
uu uu uu uu uu uu uu uu uu
agencies, including all except: - ANS>>Securities Investor Protection Corporation
uu uu uu uu uu uu uu uu uu
(SIPC)
uu
Which of the following is another term for statutory law? - ANS>>Legislation
uu uu uu uu uu uu uu uu uu uu uu
Regulatory compliance is a powerful driver for many organizations. - ANS>>True
uu uu uu uu uu uu uu uu uu uu
What are the possible outcomes of policy review? - ANS>>The policy is retired or
uu uu uu uu uu uu uu uu uu uu uu uu uu
reauthorized
uu
Which of the following is not an example of an information asset? - ANS>>Building
uu uu uu uu uu uu uu uu uu uu uu uu uu
directory
uu
Which of the following statements is true? - ANS>>Policies should require only what
uu uu uu uu uu uu uu uu uu uu uu uu
is possible.
uu uu
A cybersecurity policy must take into account all these factors except: - ANS>>The
uu uu uu uu uu uu uu uu uu uu uu uu
cultural norms of the general public
uu uu uu uu uu uu
Which of the following is the correct order of the policy life cycle? - ANS>>Develop,
uu uu uu uu uu uu uu uu uu uu uu uu uu uu
publish, adopt, review
uu uu uu
Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS devices,
uu uu uu uu uu uu uu uu uu
segmentation, and VLANs? - ANS>>Perimeter security
uu uu uu uu uu uu
Which of the following can be defined as the shared attitudes, goals, and practices
uu uu uu uu uu uu uu uu uu uu uu uu uu
that characterize a company, corporation, or institution? - ANS>>Corporate culture
uu uu uu uu uu uu uu uu uu uu
Enforcement of Gramm-Leach-Bliley Act (GLBA) was assigned to federal oversight
uu uu uu uu uu uu uu uu uu
agencies, including all except: - ANS>>Securities Investor Protection Corporation
uu uu uu uu uu uu uu uu uu
(SIPC)
uu
Which of the following is another term for statutory law? - ANS>>Legislation
uu uu uu uu uu uu uu uu uu uu uu
Regulatory compliance is a powerful driver for many organizations. - ANS>>True
uu uu uu uu uu uu uu uu uu uu
What are the possible outcomes of policy review? - ANS>>The policy is retired or
uu uu uu uu uu uu uu uu uu uu uu uu uu
reauthorized
uu
Which of the following is not an example of an information asset? - ANS>>Building
uu uu uu uu uu uu uu uu uu uu uu uu uu
directory
uu
Which of the following statements is true? - ANS>>Policies should require only what
uu uu uu uu uu uu uu uu uu uu uu uu
is possible.
uu uu
A cybersecurity policy must take into account all these factors except: - ANS>>The
uu uu uu uu uu uu uu uu uu uu uu uu
cultural norms of the general public
uu uu uu uu uu uu
Which of the following is the correct order of the policy life cycle? - ANS>>Develop,
uu uu uu uu uu uu uu uu uu uu uu uu uu uu
publish, adopt, review
uu uu uu
Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS devices,
uu uu uu uu uu uu uu uu uu
segmentation, and VLANs? - ANS>>Perimeter security
uu uu uu uu uu uu
Which of the following can be defined as the shared attitudes, goals, and practices
uu uu uu uu uu uu uu uu uu uu uu uu uu
that characterize a company, corporation, or institution? - ANS>>Corporate culture
uu uu uu uu uu uu uu uu uu uu