Exam 11: Security and Personnel

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Many who enter the field of information security are technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

D

The process of ensuring that no unnecessary access to data exists and that employees are able to perform only the minimum operations necessary on a set of data is referred to as the principle of ____________________.

Free
(Short Answer)
4.9/5
(26)
Correct Answer:
Verified

least privilege

The __________ is typically considered the top information security officer in the organization.

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

A

Job ____________________ can greatly increase the chance that an employee's misuse of the system or abuse of information will be detected by another employee.

(Short Answer)
4.7/5
(33)

A mandatory furlough provides the organization with the ability to audit the work of an individual. _________________________

(True/False)
4.8/5
(29)

The position of security technician can be offered as an entry-level position.

(True/False)
4.9/5
(43)

Security ____________________ are accountable for the day-to-day operation of the information security program.

(Short Answer)
4.8/5
(40)

The International Society of Forensic Computer Examiners (ISFCE) offers which certifications  

(Multiple Choice)
4.9/5
(40)

The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions.

(True/False)
4.9/5
(41)

A(n) ____________________ agency provides specifically qualified individuals at the paid request of another company.

(Short Answer)
4.9/5
(34)

The CISA credential is touted by ISACA as the certification that is appropriate for all but which type of professionals  

(Multiple Choice)
4.8/5
(37)

CompTIA offers a vendor-specific certification program called the Security+ certification.

(True/False)
4.9/5
(32)

Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. _________________________

(True/False)
4.8/5
(41)

The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's CBK.

(Multiple Choice)
4.8/5
(45)

A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position.

(True/False)
4.8/5
(38)

Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________.

(Multiple Choice)
4.8/5
(33)

The SSCP examination is much more rigorous than the CISSP examination.

(True/False)
4.9/5
(41)

Security managers accomplish objectives identified by the CISO and resolve issues identified by technicians. _________________________

(True/False)
4.8/5
(38)

Though CISOs are business managers first and technologists second, they must be conversant in all areas of information security, including the technical, planning, and ____________________ areas.

(Short Answer)
4.7/5
(36)

In many organizations, information security teams lack established roles and responsibilities.

(True/False)
4.8/5
(41)
Showing 1 - 20 of 77
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)