100%(22)22 out of 22 people found this document helpful
This preview shows page 2 - 5 out of 13 pages.
10 points QUESTION 81.Also known as the Federal Information Processing Standards (FIPS), the_______________ framework is a shared set of security standards required by the Federal Information Security Management Act (FISMA).NISTPCI DSSISOCOBIT10 points QUESTION 9
1.The acceptable use policy (AUP) is a document dedicated to the safeguarding of passwords.10 points QUESTION 101.The act of recording noteworthy security events that transpire on a network or computing device is known as a(n) ______________________.10 points QUESTION 111.“Privilege creep” refers to individuals who retain access privileges within an organization based on their previous jobs within the organization. This is an undesirablesituation because multiple access privileges create the conditions for employees to engage in fraud.10 points QUESTION 121.It is good practice when writing policies and standards to use terms like shouldrather than mustor need to.TrueFalse10 points QUESTION 131.There are several different best practices available for implementation when creating a plan for IT security policy compliance monitoring. One such practice is to design a baseline derived from the security policy, which entails _________________.
10 points QUESTION 141.Based on your work in the lab, to which policy definition does the following policy statement apply? 10 points QUESTION 151.Based on your work in the lab, to which policy definition does the following policy statement apply? 10 points QUESTION 161.The main difference between a guideline and a standardis that the former is a mandated control and the latter is a strong endorsement of a course of action.TrueFalse10 points QUESTION 171.Which of the following is notone of the types of control partners?10 points