Exam 11: Security and Personnel

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The security manager position is much more general than that of the CISO.

(True/False)
4.9/5
(42)

To assess the effect that changes will have on the organization's personnel management practices, the organization should conduct a ____________________feasibility study before the program is implemented.

(Short Answer)
4.9/5
(34)

The ISSEP allows CISSP certificate holders to demonstrate expert knowledge of all of the following except __________.

(Multiple Choice)
4.7/5
(43)

_____________________ departures include resignation, retirement, promotion, or relocation.

(Short Answer)
4.8/5
(40)

An organization should integrate security awareness education into a new hire's ongoing job orientation and make it a part of every employee's on-the-job security training.

(True/False)
4.8/5
(44)

ISSEP stands for Information Systems Security Experienced Professional. _________________________

(True/False)
4.9/5
(39)

The CISA credential is geared toward experienced information security managers and others who may have similar management responsibilities._________________________

(True/False)
4.9/5
(38)

Many who move to business-oriented information security were formerly__________ who were often involved in national security or cybersecurity .

(Multiple Choice)
4.8/5
(47)

Existing information security-related certifications are typically well understood by those responsible for hiring in organizations.

(True/False)
4.9/5
(35)

The model commonly used by large organizations places the information security department within the __________ department.

(Multiple Choice)
4.9/5
(41)

The advice "Know more than you say, and be more skillful than you let on" for information security professionals indicates that the actions taken to protect information should not interfere with users' actions.

(True/False)
4.9/5
(36)

__________ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization's security technology is properly implemented.

(Multiple Choice)
4.9/5
(39)

The CISSP concentrations are available for CISSPs to demonstrate knowledge that is already a part of the CISSP CBK.

(True/False)
4.8/5
(35)

GIAC stands for Global Information Architecture Certification. _________________________

(True/False)
4.8/5
(28)

Security managers are accountable for the day-to-day operation of the information security program.

(True/False)
4.9/5
(36)

Separation of ____________________ is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or availability of information.

(Short Answer)
4.8/5
(41)

Many organizations use a(n) __________ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee's tenure in the organization.

(Multiple Choice)
4.8/5
(37)

The International Society of Forensic Computer Examiners (ISFCE) offers two levels of certification: the Certified Computer Examiner (CCE) and the Master Certified Computer Examiner (MCCE). _________________________

(True/False)
4.8/5
(35)

What tasks must be performed when an employee prepares to leave an organization

(Essay)
4.8/5
(31)

The CISSP certification requires both the successful of the examination and an ____________________ by a qualified third party, typically another similarly certified professional, the candidate's employer, or a licensed, certified, or commissioned professional.

(Short Answer)
4.7/5
(37)
Showing 21 - 40 of 77
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)