CIS 475 FINAL EXAM QUESTIONS AND
ANSWERS 100% PASS
A standard is a written instruction provided by management that informs employees and others
in the workplace about proper behavior. T/F - ANS False
The ISSP is a plan which sets out the requirements that must be met by the information security
blueprint or framework. T/F - ANS False
You can create a single, comprehensive ISSP document covering all information security issues.
T/F - ANS True
A managerial guidance SysSP document is created by the IT experts in a company to guide
management in the implementation and configuration of technology. T/F - ANS False
The policy administrator is responsible for the creation, revision, distribution, and storage of the
policy. T/F - ANS True
Security training provides detailed information and hands-on instruction to employees to
prepare them to perform their duties securely. T/F - ANS True
Managerial controls set the direction and scope of the security process and provide detailed
instructions for its conduct. T/F - ANS True
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, To achieve defense in depth, an organization must establish multiple layers of security controls
and safeguards. T/F - ANS True
The ((operational plan)) documents the organization's intended long-term direction and efforts
for the next several years. T/F - ANS False - strategic
((Guidelines)) are detailed statements of what must be done to comply with policy. T/F -
ANS False - standards
A(n) ((strategic)) information security policy is also known as a general security policy, and sets
the strategic direction, scope, and tone for all security efforts. T/F - ANS False - enterprise
A security policy should begin with a clear statement of ((purpose)). T/F - ANS True
The security ((model)) is the basis for the design, selection, and implementation of all security
program elements, including policy implementation and ongoing policy and program
management. T/F - ANS false- blueprint
NIST responded to a mandate and created a voluntary ((Risk Management)) Framework that
provides an effective approach to manage cybersecurity risks. T/F - ANS True
The key components of the security perimeter include firewalls, DMZs demilitarized zones,
((Web)) servers, and IDPSs. T/F - ANS False proxy
Which of these is NOT a unique function of information security management?
a. hardware
b. planning
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
ANSWERS 100% PASS
A standard is a written instruction provided by management that informs employees and others
in the workplace about proper behavior. T/F - ANS False
The ISSP is a plan which sets out the requirements that must be met by the information security
blueprint or framework. T/F - ANS False
You can create a single, comprehensive ISSP document covering all information security issues.
T/F - ANS True
A managerial guidance SysSP document is created by the IT experts in a company to guide
management in the implementation and configuration of technology. T/F - ANS False
The policy administrator is responsible for the creation, revision, distribution, and storage of the
policy. T/F - ANS True
Security training provides detailed information and hands-on instruction to employees to
prepare them to perform their duties securely. T/F - ANS True
Managerial controls set the direction and scope of the security process and provide detailed
instructions for its conduct. T/F - ANS True
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, To achieve defense in depth, an organization must establish multiple layers of security controls
and safeguards. T/F - ANS True
The ((operational plan)) documents the organization's intended long-term direction and efforts
for the next several years. T/F - ANS False - strategic
((Guidelines)) are detailed statements of what must be done to comply with policy. T/F -
ANS False - standards
A(n) ((strategic)) information security policy is also known as a general security policy, and sets
the strategic direction, scope, and tone for all security efforts. T/F - ANS False - enterprise
A security policy should begin with a clear statement of ((purpose)). T/F - ANS True
The security ((model)) is the basis for the design, selection, and implementation of all security
program elements, including policy implementation and ongoing policy and program
management. T/F - ANS false- blueprint
NIST responded to a mandate and created a voluntary ((Risk Management)) Framework that
provides an effective approach to manage cybersecurity risks. T/F - ANS True
The key components of the security perimeter include firewalls, DMZs demilitarized zones,
((Web)) servers, and IDPSs. T/F - ANS False proxy
Which of these is NOT a unique function of information security management?
a. hardware
b. planning
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.