Exam 11: Security Policies
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
System administration policies should be in place for which of the following?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
D
Which is true about system administration policies regarding leaving employees?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
Which is NOT an example of a good password policy?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
An organizational policy requiring that all buffers have error handling to prevent buffer overruns is an example of:
(Multiple Choice)
4.9/5
(34)
Which is NOT true about organizational use of instant messaging?
(Multiple Choice)
5.0/5
(26)
Which is NOT an issue that should be covered by administrative policies?
(Multiple Choice)
4.9/5
(36)
System ____________ policies must define the steps to be taken in providing access for new users and removing access for leaving users.
(Short Answer)
5.0/5
(28)
The concept of ____________ dictates that a user should have only the access necessary to complete their job and no more.
(Short Answer)
4.9/5
(27)
Issues such as Internet access,password sharing,opening of e-mail attachments,and installing software should be controlled by ____________ policies.
(Short Answer)
4.8/5
(35)
Copying data,sharing passwords,and surfing the Internet on company time are all examples of ____________ of organizational computer assets.
(Short Answer)
4.8/5
(29)
Which is NOT a criteria by which an employee should determine an e-mail attachment can be opened?
(Multiple Choice)
4.9/5
(39)
Password length,password history,and password complexity should be mandated by ____________ policies.
(Short Answer)
4.8/5
(38)
Why does the author state that technology alone is not a panacea for network security problems?
(Multiple Choice)
4.8/5
(23)
Upon termination of an employee,____________ access to facilities as well as system access must be immediately terminated.
(Short Answer)
4.8/5
(32)
Which is NOT a reason why users should have privileges restricted to prevent them from changing their desktop images?
(Multiple Choice)
4.8/5
(30)
What is the primary reason a change control process is necessary?
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 21
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)