Planning for Security Quiz

Planning for Security Quiz

University

30 Qs

quiz-placeholder

Similar activities

Mobile Security Quiz

Mobile Security Quiz

University

25 Qs

Network Security Quiz

Network Security Quiz

University

29 Qs

Chapter 2.2.2 RFID Technology

Chapter 2.2.2 RFID Technology

7th Grade - University

35 Qs

Part 3 (101-125)

Part 3 (101-125)

University

26 Qs

cybersecurity prelim

cybersecurity prelim

University

30 Qs

Quiz_3

Quiz_3

University

25 Qs

Preliminary Examination _ IT Era

Preliminary Examination _ IT Era

University

25 Qs

Cloud Computing Test

Cloud Computing Test

University

25 Qs

Planning for Security Quiz

Planning for Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Anonymous Anonymous

Used 7+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of strategic planning in information security?

Short-term goals

Day-to-day tasks

Long-term direction and organizational goals

Technical implementation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which planning level focuses on short-term undertakings that will be completed within one or two years?

Operational Planning

Strategic Planning

Tactical Planning

Administrative Planning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of information security policy?

Enterprise Information Security Policy (EISP)

Issue-Specific Security Policy (ISSP)

Operational Security Policy (OSP)

Systems-Specific Security Policy (SysSP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary responsibility of the information security governance leadership?

Writing security policies

Managing risk management practices and ensuring the protection of assets

Designing the security architecture

Implementing daily security tasks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISSP stand for?

Information Security Standards and Procedures

Issue-Specific Security Policy

Internet Security Service Providers

Information Security Service Protocols

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a component of the Enterprise Information Security Policy (EISP)?

Specific technical configurations for firewalls

Overview of corporate security philosophy

Minimum password length requirements

Steps for configuring an operating system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of policy defines how specific technology should be implemented and configured?

Enterprise Information Security Policy

Issue-Specific Security Policy

Systems-Specific Security Policy

General Information Security Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?