Exam 11: Security and Personnel
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Many who enter the field of information security are technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
D
The process of ensuring that no unnecessary access to data exists and that employees are able to perform only the minimum operations necessary on a set of data is referred to as the principle of ____________________.
Free
(Short Answer)
4.9/5
(26)
Correct Answer:
least privilege
The __________ is typically considered the top information security officer in the organization.
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
A
Job ____________________ can greatly increase the chance that an employee's misuse of the system or abuse of information will be detected by another employee.
(Short Answer)
4.7/5
(33)
A mandatory furlough provides the organization with the ability to audit the work of an individual. _________________________
(True/False)
4.8/5
(29)
The position of security technician can be offered as an entry-level position.
(True/False)
4.9/5
(43)
Security ____________________ are accountable for the day-to-day operation of the information security program.
(Short Answer)
4.8/5
(40)
The International Society of Forensic Computer Examiners (ISFCE) offers which certifications
(Multiple Choice)
4.9/5
(40)
The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions.
(True/False)
4.9/5
(41)
A(n) ____________________ agency provides specifically qualified individuals at the paid request of another company.
(Short Answer)
4.9/5
(34)
The CISA credential is touted by ISACA as the certification that is appropriate for all but which type of professionals
(Multiple Choice)
4.8/5
(37)
CompTIA offers a vendor-specific certification program called the Security+ certification.
(True/False)
4.9/5
(32)
Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. _________________________
(True/False)
4.8/5
(41)
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's CBK.
(Multiple Choice)
4.8/5
(45)
A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position.
(True/False)
4.8/5
(38)
Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________.
(Multiple Choice)
4.8/5
(33)
The SSCP examination is much more rigorous than the CISSP examination.
(True/False)
4.9/5
(41)
Security managers accomplish objectives identified by the CISO and resolve issues identified by technicians. _________________________
(True/False)
4.8/5
(38)
Though CISOs are business managers first and technologists second, they must be conversant in all areas of information security, including the technical, planning, and ____________________ areas.
(Short Answer)
4.7/5
(36)
In many organizations, information security teams lack established roles and responsibilities.
(True/False)
4.8/5
(41)
Showing 1 - 20 of 77
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)