206. Regarding information security governance, which of the following does
a. Programs
b. Assets
c. Mission
d. Practices
207. What is the most important objective of system security planning?
a. To improve the protection of information system resources
b. To protect highly sensitive systems
c. To protect highly critical systems
d. To focus on accredited systems
208. Which of the following policy types is usually broad in scope and function?
a. Program policies
b. Issue-specific policies
c. System-specific policies
d. Network policies
209. Which of the following is
a. Nondisclosure agreements
b. Rules-of-behavior agreements
c. Employment agreements
d. Conflict-of-interest agreements
210. Which of the following linkages provide a high-level focus?
a. Link information security metrics to the organization strategic goals
b. Link information security metrics to the organization strategic objectives
c. Link information security activities to the organization-level strategic planning
d. Link information security metrics to the information security program performance
211. Which of the following IT security metrics focuses on implementation?
a. Percentage of system users that have received basic awareness training
b. Percentage of operational systems that have completed certification and accreditation following major changes
c. Percentage of new systems that completed certification and accreditation prior to the implementation
d. Percentage of systems successfully addressed in the testing of the contingency plan
Implementation metrics measure the results of implementation of security policies, procedures, and controls (i.e., demonstrates progress in implementation efforts). Effectiveness/efficiency metrics measure the results of security services delivery (i.e., monitors the results of security controls implementation).
212. Which of the following IT security metrics focuses on efficiency?
a. Percentage of systems successfully testing the contingency plan at the alternative processing site
b. Percentage of systems that use automated tools to validate performance of periodic maintenance
c. Percentage of individuals screened before being granted access to organizational information and information systems
d. Percentage of system components that undergo maintenance on schedule