ISC CISSP
ISC CISSP Certified Information Systems Security Professional
Practice Test
Version
ISC CISSP: Practice Exam QUESTION NO: 1 All of the following are basic components of a security policy EXCEPT the A. definition of the issue and statement of relevant terms. B. statement of roles and responsibilities C. statement of applicability and compliance requirements. D. statement of performance of characteristics and requirements. Answer: D Explanation: Policies are considered the first and highest level of documentation, from which the lower level elements of standards, procedures, and guidelines flow. This order , however, does not mean that policies are more important than the lower elements. These higher-level policies,
…show more content…
So that external bodies will recognize the organizations commitment to security. D. So that they can be held legally accountable. Answer: A Explanation: This really does not a reference as it should be known. Upper management is legally accountable (up to 290 million fine). External organizations answer is not really to pertinent (however it stated that other organizations will respect a BCP and disaster recover plan). Employees need to be bound to the policy regardless of who signs it but it gives validity. Ownership is the correct answer in this statement. However, here is a reference. "Fundamentally important to any security program 's success us the senior management 's high-level statement of commitment to the information security policy process and a senior management 's understanding of how important security controls and protections are to the enterprise 's continuity. Senior management must be "Pass Any Exam. Any Time." - www..com 4
Ac
tua
lTe
sts
Explanation: Information security policies are high-level plans that describe the goals of the procedures or controls. Policies describe security in general, not specifics. They provide the blueprint fro an overall security program just as a specification defines your next product. - Roberta Bragg CISSP Certification Training Guide (que) pg 587
.co
m
ISC CISSP: Practice Exam aware of the importance of security implementation to preserve the organization 's viability (and for their own 'due care
When a security policy is developed, it should be well defined and the information in it should be clear and plainly understand and the objectives should be well defined so that there will be no confusion. Conversely, a data system with security policies is probably going to have an assortment of countermeasures that address a range of threats. Policies, standards, guidelines, and coaching materials that are known to be obsolete and not enforced could be dangerous to a corporation due to the data being outdated. As a result, management is basically drawn into thinking that security policies do exist within the organization when actually that is not the case. Counter measures which are outdated does not do an organization any good because without the appropriate patches in place, the organization’s network could have holes which would leave them extremely vulnerable. All organizations need to be compelled to actively
This policy establishes the guidelines that the organization follows. This would include an acceptable use policy, an authentication policy, and an incident response policy (“The IT Security Policy Guide”, n.d., pg. 6). This policy will reflect the entire organizations security posture, not just the IT department ideas. A strong policy will help employees understand what is expected of them, and explain to customers how their information is protected.
Management defines information security policies to describe how the organization wants to protect its information assets. After policies are outlined, standards are defined to set the mandatory rules that will be used to implement the policies. Some policies can have multiple guidelines, which are recommendations as to how the policies can be implemented. Finally, information security management, administrators, and engineers create procedures from the standards and guidelines that follow the policies.
The organisation maintains policies for the effective and secure management of its information assets and resources.
This policy provides a framework for the management of information security throughout Cañar Networking organization. It applies to:
|Review of Informational |Whether the Information Security Policy is|The security policy |Without the review of |Each policy should be |
The higher the ROA the better as the company is earning more off less investment
Requirements & Regulations that are needed for compliance: It is very important to meet the requirements of security standards and guidelines that are given out to be in compliance. For example, PCI-DSS requires networks to be secure and that credit card data if saved must be encrypted to meet compliance. Keeping this compliance up not only reduces overall costs and increases overall security, but also reduces the risks of penalties being placed against the business. A best practice would be for the security professionals to be pro-active and be always up to date on
A network security policy is a document that states how company intends to protect the company’s physical and information technology assets. (Rouse, 2007) A security policy is intended to be a living document that is constantly evolving as threats and preventative measures change. The network security policy is more than just a list of rules however, it can be used to educate users on what to look for to prevent threats fro occurring and how to respond and report threats if a user believes a systems has become compromised. In addition, the policy also explains how enforcement will be maintained and consistent evaluation of the policy will be reviewed to make any necessary changes.
Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. The purpose of the Information Security Policy Framework is to insure your organization will be able to provide the minimum security level necessary to maintain confidentiality, integrity, and availability of the information it collects and uses.
Evaluated policies, standards, procedures and guidelines in place to enable employees to be enablers to a robust security awareness program. (Obj. B)
Thirdly there must be a commitment of management that it will strictly adhere to the policy. This is very significant (Dasgupta, 2007).
Designing a working plan for securing the organization s information assets begins by creating or validating an existing security blueprint for the implementation of needed security controls to protect the information assets. A framework is the outline from which a more detailed blueprint evolves. The blueprint is the basis for the design, selection, and implementation of all subsequent security policies, education and training programs, and technologies. The blueprint provides scaleable, upgradeable, and comprehensive security for the coming years. The blueprint is used to plan the tasks to be accomplished and the order in which
There is no cookie cutter Information Security Policy’s for every company or organization. Information Security Policies are designed based on a company or organization’s technological systems, information based on classification of information in the organization, contractual and legal limitations dependent on laws and contracts pertaining to the organization and the risk level that the organizations management is willing to accept.