100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Developing Cybersecurity Programs and Policies, Santos - Exam Preparation Test Bank (Downloadable Doc)

Rating
-
Sold
4
Pages
111
Grade
A+
Uploaded on
24-05-2022
Written in
2021/2022

Description: Test Bank for Developing Cybersecurity Programs and Policies, Santos, 3e prepares you efficiently for your upcoming exams. It contains practice test questions tailored for your textbook. Developing Cybersecurity Programs and Policies, Santos, 3e Test bank allow you to access quizzes and multiple choice questions written specifically for your course. The test bank will most likely cover the entire textbook. Thus, you will get exams for each chapter in the book. You can still take advatange of the test bank even though you are using newer or older edition of the book. Simply because the textbook content will not significantly change in ne editions. In fact, some test banks remain identical for all editions. Disclaimer: We take copyright seriously. While we do our best to adhere to all IP laws mistakes sometimes happen. Therefore, if you believe the document contains infringed material, please get in touch with us and provide your electronic signature. and upon verification the doc will be deleted.

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 24, 2022
Number of pages
111
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Developing Cybersecurity Programs and Policies (Santos)

Chapter 1 Understanding Cybersecurity Policy and Governance



1) Which of the following elements ensures a policy is enforceable?

A) Compliance can be measured.

B) Appropriate sanctions are applied when the policy is violated.

C) Appropriate administrative, technical, and physical controls are put in place to support
the policy.

D) All of the above

Answer: D



2) FERPA protects which of the following?

A) Medical records

B) Educational records

C) Personally identifiable information

D) Financial records

Answer: B



3) Which of the following is an example of an information asset?

A) Business plans

B) Employee records

C) Company reputation

D) All of the above

Answer: D

,4) Policy implementation and enforcement are part of which of the following phases of
the cybersecurity policy life cycle?

A) Develop

B) Review

C) Adopt

D) Publish

Answer: C



5) Which of the following is the correct order of the policy life cycle?

A) Review, develop, adopt, publish

B) Develop, publish, adopt, review

C) Publish, develop, review, adopt

D) Review, adopt, develop, publish

Answer: B



6) Endorsed is one of the seven policy characteristics. Which of the following statements
best describes endorsed?

A) The policy is supported by management.

B) The policy is accepted by the organization’s employees.

C) The policy is mandatory; compliance is measured; and appropriate sanctions are
applied.

D) The policy is regulated by the government.

Answer: A



7) Which of the following is the outcome of policy review?

A) Retirement or renewal

,B) Retirement or reauthorization

C) Renewal or reauthorization

D) None of the above

Answer: B



8) How often should policies be reviewed?

A) Monthly

B) Twice a year

C) Annually

D) Never

Answer: C



9) Which of the following statements is not true?

A) Policies should require only what is possible.

B) Policies that are no longer applicable should be retired.

C) All guiding principles and corporate cultures are good.

D) Guiding principles set the tone for a corporate culture.

Answer: C



10) Which of the following is not one of the tasks of the policy development phase?

A) Approve

B) Write

C) Communicate

D) Authorize

Answer: C

, 11) The United States Department of Homeland Security defines how many critical
infrastructure sectors?

A) 16

B) 14

C) 20

D) 17

Answer: A



12) Which of the following is the seminal tool used to protect both our critical
infrastructure and our individual liberties?

A) Information security

B) Society

C) Physical security

D) Policy

Answer: D

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
tb4u City University New York
View profile
Follow You need to be logged in order to follow users or courses
Sold
971
Member since
3 year
Number of followers
776
Documents
2374
Last sold
1 week ago

4.0

158 reviews

5
87
4
27
3
19
2
6
1
19

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions