Policies & Procedures for Cybersecurity Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Processes and actions taken to implement the requirements in the policy documents is called _____

Question 2 2. Information security policy documents include _____

Question 3 3. An example of an information security policy document consists of the following components

Question 4 4. The purpose of a Business Continuity Plan Policy is to _____

Question 5 5. Set of framework policy documents created to guide the enforcement of measures protecting information and data of an organization from unauthorized access, sharing, loss or damage is called _____

Page 2

Question 6 6. Which of the following is a characteristic of an information security model architecture?

Question 7 7. Which of the following is NOT described by an information security model?

Question 8 8. Information security is the umbrella term used to describe the collection of _____ and _____ employed to protect information.

Question 9 9. Which of the following is NOT determined by information security model governance?

Question 10 10. _____ describes the rules used to implement and enforce an information security model.

Page 3

Question 11 11. What should be at the beginning of web address before you key personal data into it?

Question 12 12. What are two types of authentication?

Question 13 13. Of the following, what is not a method of authentication?

Question 14 14. Which of the following is a good password? Choose the best answer.

Question 15 15. What is phishing?

Page 4

Question 16 16. An information plan is a detailed account of the _____, _____, and _____ of information security at an organization.

Question 17 17. Which of the following is NOT a technology used by information security?

Question 18 18. _____ is the process of investigating and identifying the source, effects, and mitigation of any threat when it occurs.

Question 19 19. Which of the following is NOT a focus for information security?

Question 20 20. Which of the following is NOT a section in an information security plan?

Page 5

Question 21 21. To ensure that the information security framework is well implemented and aligns with the business needs of Best Stocks, the following best practices as defined by the industry's professional bodies are observed _____

Question 22 22. The various processes involved collectively to protect an organization's information asset is called _____

Question 23 23. A collection of standardized policies, procedures and guides, meant to direct a firm or any organization, which adopts its use, on how to protect its infrastructure from security breaches is called _____

Question 24 24. One of the commonly used frameworks for information security management is _____

Question 25 25. The main reason for using an information security framework are as follows _____

Page 6

Question 26 26. A(n) _____ defines the risk of information compromising security if it's leaked.

Question 27 27. HIPAA is an example of a(n) _____ information security policy?

Question 28 28. Requiring users to change their passwords is an example of a(n) _____ security policy?

Question 29 29. What is an example of an administrative information security policy?

Question 30 30. What is one of the major challenges of information security policies?

Policies & Procedures for Cybersecurity Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support