1. The setup instructions that come in the box when you buy a new printer are an example of which of

Do you require help with your paper? Use our custom writing service to achieve better grades and meet your deadlines. Trust our team of writing experts with your work today, and enjoy peace of mind.


Order a Similar Paper Order a Different Paper

1.
The setup instructions that
come in the box when you buy a new printer are an example of which of the
following?
A.
Standards
B.
Procedures
C.
Guidelines
D.
Policies

2.
The passage “In order to
protect their home computers, remote users should consider installing
anti-virus software, a firewall, and anti-spam filters†represents which of the
following:
A.
Procedures
B.
Guidelines
C.
Policy
D.
Standards

3.
In which of the following
ways do password construction standards in a password policy make it better?
A.
Standards suggest options for
the best way to comply with the policy
B.
Standards provide a permanent
basis for the policy
C.
Standards help to ensure
consistency with minimum requirements
D.
Standards indicate who is
affected by the policy

4.
Which of the following is a
good way to help ensure that your company’s information security policies
represent best practices?
A.
Base them on current industry
standards for practices and technology
B.
Provide little or no
opportunity for policy exceptions to be granted
C.
Copy key parts of similar
policies you find on the Internet
D.
Keep the suggested guidelines
to a minimum, and focus on mandatory standards

5.
When writing a new
information security policy to cover data movement within your company, which
of the following represents the BEST approach to take in order to ensure the
policy will fulfill its intended purpose, help the policy audience understand
what they need to do, and be sustainable?
A.
Provide supporting
documentation outside the policy document, in order to make it easier to
implement, manage, and update
B.
Follow existing standards,
guidelines, and procedures as the policy
C.
Develop a comprehensive policy,
by including all applicable policy elements and supporting documentation in the
policy document
D.
Hold workshops to build
employees’ awareness of the policy after it is written and approved

6.
Which of the following is
the reason why United States government official communications about new
federal laws frequently include references to other documents?
A.
This approach is required by
law
B.
Congress must ensure that the
new laws are comprehensive, so they can be defended in court
C.
These references help those
affected by the new laws gain a better understanding of what they need to do
D.
It makes it easier to keep
track of things

7.
In which of the following
ways does understanding policy elements enable the development of information
security policies?
A.
One cannot develop information
security policies without an understanding of policy elements
B.
Understanding policy elements
enables us to break the policies down into their essential components, in order
to more efficiently and effectively create usable policies
C.
Information security policies
must include all policy elements in order to be valid
D.
It is necessary to understand
policy elements in order to document which penalties apply for violation of
information security policies

8.
Which of the following is
NOT true of policy elements?
A.
Policy elements can be thought
of as individual sections of the policy document
B.
Standards, guidelines, and
procedures are policy elements
C.
Each policy element has its own
specific purpose
D.
Understanding policy elements
helps you focus on the goal of each section of the policy, in order to be more
consistent in how you write

9.
Which of the following is
an important function of the statement of authority?
A.
It provides a bridge between an
organization’s core values and security strategies
B.
It indicates who to talk to if
you want to request a change in the policy
C.
It describes the penalties for
policy infractions
D.
It references standards,
guidelines, and procedures which the reader can consult for clarification of
the policy

10.
Which of the following is a
reason why information security policy documents should include a version or
change control number?
A.
In order to maintain
consistency
B.
It is required by law
C.
It can be a good way to promote
that you wrote the policy
D.
Information technology uses a
lot of math

Writerbay.net

Our writing experts are ready and waiting to assist with any writing project you may have. From simple essays, research papers, lab reports, and dissertations, to online classes, you can be sure we have a service that perfectly matches your needs.


Order a Similar Paper Order a Different Paper