Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Key elements in a Security Policy will include: (select all that apply)
Scope
Purpose
Information Security Objectives
Program Stakeholders
See http://resources.infosecinstitute.com/key-elements-information-security-policy/
Note sure Program Stakeholders is excluded.
"2.8 Responsibilities, Rights and Duties of Personnel
General considerations in this direction lean towards responsibility of persons appointed to carry out the implementation, education, incident response, user access reviews, and periodic updates of an ISP.
Prevention of theft, information know-how and industrial secrets that could benefit competitors are among the most cited reasons why a business may want to employ an ISP to defend its digital assets and intellectual rights.
2.10 Other Items that An ISP May Include:
Virus Protection Procedure, Intrusion Detection Procedure, Remote Work Procedure, Technical Guidelines, Audit, Employee Requirements, Consequences for Non-compliance, Disciplinary Actions, Terminated Employees, Physical Security of IT, References to Supporting Documents and so on."
Responsibility of persons appointed to carry out the implementation, education, incident response, user access reviews, and periodic updates of an ISP. and Employee Requirements could include Stakeholders. Especially when combined with Scope.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.