
Chapter 16: Security Governance and Compliance
Authored by Fhaa Lossx
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Joe is authoring a document that explains to system administrators one way in which they might comply with the organization's requirement to encrypt all laptops. What type of document is Joe writing?
Policy
Guideline
Procedure
Standard
Answer explanation
Key Phrase: "One way to comply"
Explanation:
Correct Answer (B): Joe is writing a guideline because the key phrase “one way” suggests a non-mandatory approach to compliance. Guidelines offer recommendations rather than enforceable rules.
Why others are wrong:
A: Policy - Policies are mandatory and define required behaviors, which is not indicated in the scenario.
C: Procedure - A procedure would involve a detailed step-by-step process, which isn’t described here.
D: Standard - Standards are also mandatory and enforceable, but Joe is describing one option for compliance, not a strict requirement.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which one of the following statements is NOT true about compensating controls under PCI DSS?
Controls used to fulfill one PCI DSS requirement may be used to compensate for the absence of a control needed to meet another requirement.
Controls must meet the intent of the original requirement.
Controls must meet the rigor of the original requirement.
Compensating controls must provide a similar level of defense as the original requirement.
Answer explanation
Key Phrase: "Compensating controls"
Explanation:
Correct Answer (A): PCI DSS compensating controls must meet the same rigor as the original control, but they cannot be used across different requirements. The original requirement must be met independently, and compensating controls should address gaps in specific requirements.
Why others are wrong:
B: Controls must meet the intent of the original requirement - This is correct. Compensating controls should fulfill the original intent of the requirement.
C: Controls must meet the rigor of the original requirement - This is also true; compensating controls should not be less rigorous than the original control.
D: Compensating controls must provide a similar level of defense as the original requirement - This is correct as well. Compensating controls should offer an equivalent level of protection.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What law creates privacy obligations for those who handle the personal information of European Union residents?
HIPAA
FERPA
GDPR
PCI DSS
Answer explanation
Key Phrase: "Personal information of EU residents"
Explanation:
Correct Answer (C): The General Data Protection Regulation (GDPR) governs the handling of personal data for residents of the European Union, imposing strict privacy requirements.
Why others are wrong:
A: HIPAA - HIPAA applies to the healthcare industry and U.S. citizens' health data.
B: FERPA - FERPA applies to educational institutions in the U.S. and governs student records, not personal data in general.
D: PCI DSS - PCI DSS applies to payment card information, not general personal data privacy.
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which one of the following is NOT one of the five core security functions defined by the NIST Cybersecurity Framework?
Identify
Contain
Respond
Recover
Answer explanation
Key Phrase: "Core security functions"
Explanation:
Correct Answer (B): The NIST Cybersecurity Framework includes the following five core functions: Identify, Protect, Detect, Respond, and Recover. "Contain" is not one of them.
Why others are wrong:
A: Identify - This is one of the five core functions: understanding assets, risks, and vulnerabilities.
C: Respond - This is a core function: responding to detected cybersecurity events.
D: Recover - This is a core function: restoring capabilities after a cybersecurity event.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What ISO standard provides guidance on privacy controls?
27002
27001
27701
31000
Answer explanation
Key Phrase: "Privacy controls"
Explanation:
Correct Answer (C): ISO 27701 specifically provides guidelines on privacy controls and how to integrate them with ISO 27001, which is focused on information security management.
Why others are wrong:
A: ISO 27002 - ISO 27002 provides guidelines on the implementation of information security controls, not privacy-specific ones.
B: ISO 27001 - ISO 27001 is focused on information security management systems, not specifically privacy.
D: ISO 31000 - ISO 31000 provides guidelines on risk management, not privacy.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which one of the following documents must normally be approved by the CEO or a similarly high-level executive?
Standard
Procedure
Guideline
Policy
Answer explanation
Key Phrase: "Approved by the CEO or high-level executive"
Explanation:
Correct Answer (D): Policies usually require approval from senior leadership, such as the CEO, because they are mandatory and set the direction for the organization’s security practices.
Why others are wrong:
A: Standard - While standards are important, they often do not require CEO approval, though they do need executive endorsement.
B: Procedure - Procedures are operational and often approved by department heads or managers, not necessarily the CEO.
C: Guideline - Guidelines are optional and do not typically require high-level approval.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Greg would like to create an umbrella agreement that provides the security terms and conditions for all future work that his organization does with a vendor. What type of agreement should Greg use?
BPA
MOU
MSA
SLA
Answer explanation
Key Phrase: "Umbrella agreement"
Explanation:
Correct Answer (C): An MSA (Master Service Agreement) is a long-term contract that outlines the general terms and conditions for all future work with a vendor, including security requirements. It serves as the overarching agreement, with project-specific details covered in statements of work (SOWs).
Why others are wrong:
A: BPA - A BPA (Blanket Purchase Agreement) is typically used for purchasing goods and services in an ongoing relationship, not specifically for security terms.
B: MOU - An MOU (Memorandum of Understanding) is a non-binding agreement that outlines general intentions but doesn't typically cover detailed security terms.
D: SLA - An SLA (Service Level Agreement) focuses on service performance and quality, not overarching terms or security conditions.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
Quiz on Misinformation and Bias
Quiz
•
10th Grade - University
20 questions
DI (EM24) - Diseño de Contenidos (T8)
Quiz
•
University - Professi...
20 questions
The Internet
Quiz
•
University
18 questions
videojuegos generales
Quiz
•
University
20 questions
COA_QUIZ_UNIT I
Quiz
•
University
21 questions
CPA MS-Office Hotkeys Quiz
Quiz
•
8th Grade - Professio...
16 questions
Algo Quiz
Quiz
•
University
20 questions
UNIT IV Normalization
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University