Planning for Security Quiz

Planning for Security Quiz

University

30 Qs

quiz-placeholder

Similar activities

Introduction to Internet and WWW

Introduction to Internet and WWW

University

25 Qs

IT AppDev 1 Pre-Midterm-Quiz

IT AppDev 1 Pre-Midterm-Quiz

University

25 Qs

IT Concepts 3

IT Concepts 3

12th Grade - University

25 Qs

Data Privacy Long Quiz

Data Privacy Long Quiz

University

30 Qs

Form 2 - Information Technology Quiz

Form 2 - Information Technology Quiz

8th Grade - University

25 Qs

IT 312 (SIA) LONG QUIZ REVIEWER

IT 312 (SIA) LONG QUIZ REVIEWER

University

30 Qs

The Cloud

The Cloud

University

26 Qs

Planning for Security Quiz

Planning for Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Anonymous Anonymous

Used 7+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of strategic planning in information security?

Short-term goals

Day-to-day tasks

Long-term direction and organizational goals

Technical implementation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which planning level focuses on short-term undertakings that will be completed within one or two years?

Operational Planning

Strategic Planning

Tactical Planning

Administrative Planning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of information security policy?

Enterprise Information Security Policy (EISP)

Issue-Specific Security Policy (ISSP)

Operational Security Policy (OSP)

Systems-Specific Security Policy (SysSP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary responsibility of the information security governance leadership?

Writing security policies

Managing risk management practices and ensuring the protection of assets

Designing the security architecture

Implementing daily security tasks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISSP stand for?

Information Security Standards and Procedures

Issue-Specific Security Policy

Internet Security Service Providers

Information Security Service Protocols

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a component of the Enterprise Information Security Policy (EISP)?

Specific technical configurations for firewalls

Overview of corporate security philosophy

Minimum password length requirements

Steps for configuring an operating system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of policy defines how specific technology should be implemented and configured?

Enterprise Information Security Policy

Issue-Specific Security Policy

Systems-Specific Security Policy

General Information Security Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?