Please
use Microsoft Explorer as your browser to use this tool.
Texas Collaborative Module Wireless Security Technology
|
IS Policy, Standards, and Guidelines Quiz |
1. How can a security framework assist in the design and implementation of a security infrastructure?
|
2. Where can a security administrator go to find information on established security frameworks?
|
3. What are the inherent problems with ISO 17799, and why hasn’t the U.S. adopted it? What are the recommended alternatives?
|
4. What documents are available from the NIST Computer Resource Center, and how can they support the development of a security framework?
|
5. Can an organization that does not use the VISA cardholder protection system in conjunction with the processing of credit cards benefit from VISA’s security framework? How?
|
6. What benefit can a private, for-profit agency derive from best practices designed for federal agencies?
7. What resources are available on the Web to aid an organization in developing best practices as part of a security framework?
|
8. Briefly describe the management, an operational, and a technical control, and explain when would each be applied as part of a security framework?
9. What is the difference between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?
|
10. Who is ultimately responsible for managing a technology? Who is responsible for enforcing it?
11. What is contingency planning? How is it different from routine management planning? What are components of contingency planning?
|
12. When is IRP used?
|
13. When is DRP used?
|
14. When is BCP used? How do you determine when to use IRP, DRP, or BCP plans?
|
15. What are the five elements of a business impact analysis?
|
16. What are Pipkin’s three categories of incident indicators?
|
17. What is containment and why is it part of the planning process?
|
18. What is computer forensics? When are the results of computer forensics used?
|
19. What is an after-action review? When is it performed? Why is it done?
|
20. List and describe the six continuity strategies.
|
| | |