Appendix A. Answer Key

CHAPTER 1 Information Systems Security Policy Management

  1. C

  2. Standards

  3. A

  4. D and E

  5. Procedure

  6. D

  7. B

  8. Human

  9. E

  10. B

CHAPTER 2 Business Drivers for Information Security Policies

  1. C

  2. A

  3. A

  4. Preventive

  5. C

  6. B

  7. D

  8. B

  9. D

  10. A

  11. A

  12. B

  13. B

  14. D

  15. D

CHAPTER 3 U.S. Compliance Laws and Information Security Policy Requirements

  1. B

  2. E

  3. E

  4. D

  5. Control environment

  6. B

  7. CIPA

  8. A

  9. B

  10. B

  11. D

CHAPTER 4 Business Challenges Within the Seven Domains of IT Responsibility

  1. B

  2. A

  3. C

  4. C

  5. LAN-to-WAN Domain

  6. D

  7. Segmented network

  8. A

  9. B

  10. B

  11. D

  12. B

  13. C

  14. B

  15. C

CHAPTER 5 Information Security Policy Implementation Issues

  1. E

  2. B

  3. Be in the background; precisely what is asked of them

  4. The cost of business

  5. B

  6. A

  7. C

  8. This avoids language that could be interpreted as an employment contract or unintended promise. Also, the use of vague terms such as "generally," "typically," or "usually" give managers and ...

Get Security Policies and Implementation Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.