Exam 11: Security Policies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

System administration policies should be in place for which of the following?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

D

Which is true about system administration policies regarding leaving employees?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

Which is NOT an example of a good password policy?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

An organizational policy requiring that all buffers have error handling to prevent buffer overruns is an example of:

(Multiple Choice)
4.9/5
(34)

Which is NOT true about organizational use of instant messaging?

(Multiple Choice)
5.0/5
(26)

Which is NOT an issue that should be covered by administrative policies?

(Multiple Choice)
4.9/5
(36)

Which is true about user security policies?

(Multiple Choice)
4.8/5
(29)

System ____________ policies must define the steps to be taken in providing access for new users and removing access for leaving users.

(Short Answer)
5.0/5
(28)

The concept of ____________ dictates that a user should have only the access necessary to complete their job and no more.

(Short Answer)
4.9/5
(27)

Issues such as Internet access,password sharing,opening of e-mail attachments,and installing software should be controlled by ____________ policies.

(Short Answer)
4.8/5
(35)

What should NOT be considered in creating a good password?

(Multiple Choice)
4.8/5
(41)

Copying data,sharing passwords,and surfing the Internet on company time are all examples of ____________ of organizational computer assets.

(Short Answer)
4.8/5
(29)

Which is NOT a criteria by which an employee should determine an e-mail attachment can be opened?

(Multiple Choice)
4.9/5
(39)

The primary vehicle for virus distribution is ____________.

(Short Answer)
4.8/5
(37)

Password length,password history,and password complexity should be mandated by ____________ policies.

(Short Answer)
4.8/5
(38)

Why does the author state that technology alone is not a panacea for network security problems?

(Multiple Choice)
4.8/5
(23)

Upon termination of an employee,____________ access to facilities as well as system access must be immediately terminated.

(Short Answer)
4.8/5
(32)

Which is NOT a reason why users should have privileges restricted to prevent them from changing their desktop images?

(Multiple Choice)
4.8/5
(30)

Which is true about access control policies?

(Multiple Choice)
4.8/5
(37)

What is the primary reason a change control process is necessary?

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 21
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)