• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
____ work directly with data owners and are responsible for the storage, maintenance and protection of the information.
Data custodians
The National Association of Corporate Directors (NACD) recommends four essential practices for boards of directors. Which of the following is NOT one of these recommended practices?
Place information security at the top of the board’s agenda
The ____ phase is typically the most important phase of the security systems development life cycle (SecSDLC).
maintenance
The ____ explicitly declares the business of the organization and its intended areas of operations.
mission statement
According to the Corporate Governance Task Force (CGTF), in order to build programs suited to their needs, organizations should do all but which of the following?
Create and execute a plan for punitive action for employees who fail to resolve information security deficiencies
According to the Corporate Governance Task Force (CGTF), during which phase in the IDEAL model and framework does the organization plan the specifics of who it will reach its destination?
Establishing
The basic outcomes of information security governance should include all but which of the following?
Resource management by executing appropriate measures to manage and mitigate risks to information technologies
Which of the following is an information security governance responsibility of the organization’s employees?
Implement policy, report security vulnerabilities and breaches
A ____ is a feature left behind by system designers or maintenance staff.
back door
Which of the following is a characteristic of the bottom-up approach to security implementation?
Systems administrators attempting to improve the security of their systems
In the ____ phase of the security systems development life cycle (SecSDLC), the information obtained during the analysis phase is used to develop a proposed system-based solution for the business problem.
logical design
____ controls set the direction and scope of the security process and provide detailed instructions for its conduct.
Managerial
Operational plans are used by ____.
managers
The ____ statement contains a formal set of organizational principles, standards, and qualities.
values
According to the Corporate Governance Task Force (CGTF), during which phase in the IDEAL model and framework does the organization do the work according to the plan?
Acting
According to the Corporate Governance Task Force (CGTF), in order to build programs suited to their needs, organizations should do all but which of the following?
Conduct an annual information security evaluation, the results of which the CISO should review with security staff and then report to the board of directors
The information security governance framework generally consists of which of the following?
A security strategy that talks about the value of information technologies protected
____ commonly specify who can access a particular set of information.
Data owners
Vision statements are meant to be ____.
ambitious
At the end of each phase of the security systems development life cycle (SecSDLC), a ____ takes place.
structured review