Copyright

Information Security Policy & Procedure Examples

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Set of framework policy documents created to guide the enforcement of measures protecting information and data of an organization from unauthorized access, sharing, loss or damage is called _____

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Information security policy documents include _____

2. Processes and actions taken to implement the requirements in the policy documents is called _____

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

This quiz and its attached worksheet allow you to find out if you understand information security policy making. You will need to discuss how this process is used and what the goals of it are.

Quiz & Worksheet Goals

In this assessment, you'll see what you remember about:

  • Examples of information security documents
  • The name given to any process or action done to implement policy requirements
  • Major components of any information security document

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the lesson, such as some examples of common information security documents
  • Defining key concepts - ensure that you can accurately define main terms, such as business continuity plan policy
  • Information recall - access the knowledge you've gained regarding the name given to all documents within a company relating to the protection of information and data from unauthorized access

Additional Learning

To find out more about this type of data protection, read the lesson titled Information Security Policy & Procedure Examples. You will learn about new concepts, such as:

  • Companies that utilize these plans
  • Components of the information security framework
  • Policies that most information security plans will include
Support