Security & IntelligenceAnswer Key

Which Of These Best Defines Information Security Governance

20 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

The application of the principle and practices of corporate governance to the information security function.

ANSWER

Which of these best defines information security governance?

QUESTION 2

de jure

ANSWER

Standards may be published, scrutinized, and ratified by a group, as in formal or __________ standards.

QUESTION 3

Regulatory compliance by using information security knowledge and infrastructure to support minimum standards of due care

ANSWER

The goals of information security governance include all but which of the following?

QUESTION 4

operational planning

ANSWER

The actions taken by management to specify the short-term goals and objectives of the organization are ________.

QUESTION 5

EISP

ANSWER

The ______ is the high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts.

QUESTION 6

identify and prioritize for improvement within the context of a continuous and repeatable process

ANSWER

In early 2014, in response to Executive Order 13636, NIST published the Cybersecurity Framework, which intends to allow organizations to _____________.

QUESTION 7

framework

ANSWER

An information security _______ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

QUESTION 8

management

ANSWER

The stated purpose of ISO/IEC 27002:2013 is to give guidelines for organizational information security standards and information security __________ practices.

QUESTION 9

Operational

ANSWER

_____ controls address personnel security, physical security, and the protection of production inputs and outputs.

QUESTION 10

standard

ANSWER

A detailed statement of what must be done to comply with management intent is known as a __________.

QUESTION 11

guideline

ANSWER

Nonmandatory recommendations the employee may use as a reference is known as a _______.

QUESTION 12

Defense in depth

ANSWER

_________ is a strategy for the protection of information assets that uses multiple layers and different types of controls (managerial, operational, and technical) to provide optimal protection.

QUESTION 13

The global information security community had already defined a justification for a code of practice, such as the one identified in ISO/IEC 17799.

ANSWER

When ISO 17799 first came out, several countries, including the United States, Germany, and Japan, refused to adopt it, claiming that it had fundamental problems. Which of the following is NOT one of those problems?

QUESTION 14

Managerial

ANSWER

____ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.

QUESTION 15

domains

ANSWER

Security ______ are the areas of trust within which users can freely communicate.

QUESTION 16

tactical planning

ANSWER

The actions taken by management to specify the intermediate goals and objectives of the organization are ____________.

QUESTION 17

SysSPs

ANSWER

_____ often function as standards or procedures to be used when configuring or maintaining systems.

QUESTION 18

people

ANSWER

The spheres of security are the foundation of the security framework and illustrate how information is under attack from a variety of sources, with far fewer protection layers between the information and potential attackers on the _______ side of the organization.

QUESTION 19

Reduncancy

ANSWER

___________ is a strategy of suing multiple types of controls that prevent the failure of one system from compromising the security of informaiton.

QUESTION 20

blueprint

ANSWER

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials