Exam 11: Security and Personnel

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What functions does the CISO perform

(Essay)
4.8/5
(31)

"Builders" in the field of information security provide day-to-day systems monitoring and use to support an organization's goals and objectives.

(True/False)
4.9/5
(37)

Which of the following is not one of the categories of positions defined by Schwartz, Erwin, Weafer, and Briney  

(Multiple Choice)
4.7/5
(35)

ISACA touts the CISA certification as being appropriate for accounting, networking, and security professionals._________________________

(True/False)
4.8/5
(37)

The general management community of interest must work with information security professionals to integrate solid information security concepts into the personnel management practices of the organization.

(True/False)
4.9/5
(33)

The ISSMP examination is designed to provide CISSPs with a mechanism to demonstrate competence in __________.

(Multiple Choice)
4.8/5
(37)

When new employees are introduced into the organization's culture and workflow, they should receive an extensive information security briefing as part of their employee ____________________.

(Short Answer)
4.8/5
(30)

According to Schwartz, Erwin, Weafer, and Briney, "__________" are the real techies who create and install security solutions.

(Multiple Choice)
4.8/5
(37)

The use of standard job descriptions can increase the degree of professionalism in the information security field.

(True/False)
4.7/5
(37)

In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.

(True/False)
4.8/5
(34)

"Administrators" provide the policies, guidelines, and standards in the Schwartz, Erwin, Weafer, and Briney classification. _________________________

(True/False)
4.8/5
(44)

The ____________________ of (ISC)2 program is geared toward those who want to take the CISSP or SSCP exam before obtaining the requisite experience for certification.

(Short Answer)
4.9/5
(37)

Many hiring managers in information security prefer to recruit a security professional who already has proven HR skills and professional experience, since qualified candidates with information security experience are scarce. _________________________

(True/False)
4.8/5
(37)

Because the goals and objectives of CIOs and CISOs tend to contradict each other, InformationWeek recommends: "The people who do and the people who watch shouldn't report to a ____________________ manager."

(Short Answer)
4.7/5
(24)

Describe the concept of separation of duties.

(Essay)
4.8/5
(34)

To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility.

(True/False)
4.8/5
(39)

The information security function can be placed within the __________.

(Multiple Choice)
4.9/5
(37)

The information security function cannot be placed within protective services.

(True/False)
4.9/5
(40)

Sometimes, contracted employees are self-employed or are employees of an organization hired for a specific, one-time purpose. These people are typically referred to as ____________________.

(Short Answer)
4.8/5
(28)

__________ is the requirement that every employee be able to perform the work of another employee.

(Multiple Choice)
4.9/5
(37)
Showing 41 - 60 of 77
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)