Exam 11: Security and Personnel
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
"Builders" in the field of information security provide day-to-day systems monitoring and use to support an organization's goals and objectives.
(True/False)
4.9/5
(37)
Which of the following is not one of the categories of positions defined by Schwartz, Erwin, Weafer, and Briney
(Multiple Choice)
4.7/5
(35)
ISACA touts the CISA certification as being appropriate for accounting, networking, and security professionals._________________________
(True/False)
4.8/5
(37)
The general management community of interest must work with information security professionals to integrate solid information security concepts into the personnel management practices of the organization.
(True/False)
4.9/5
(33)
The ISSMP examination is designed to provide CISSPs with a mechanism to demonstrate competence in __________.
(Multiple Choice)
4.8/5
(37)
When new employees are introduced into the organization's culture and workflow, they should receive an extensive information security briefing as part of their employee ____________________.
(Short Answer)
4.8/5
(30)
According to Schwartz, Erwin, Weafer, and Briney, "__________" are the real techies who create and install security solutions.
(Multiple Choice)
4.8/5
(37)
The use of standard job descriptions can increase the degree of professionalism in the information security field.
(True/False)
4.7/5
(37)
In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.
(True/False)
4.8/5
(34)
"Administrators" provide the policies, guidelines, and standards in the Schwartz, Erwin, Weafer, and Briney classification. _________________________
(True/False)
4.8/5
(44)
The ____________________ of (ISC)2 program is geared toward those who want to take the CISSP or SSCP exam before obtaining the requisite experience for certification.
(Short Answer)
4.9/5
(37)
Many hiring managers in information security prefer to recruit a security professional who already has proven HR skills and professional experience, since qualified candidates with information security experience are scarce. _________________________
(True/False)
4.8/5
(37)
Because the goals and objectives of CIOs and CISOs tend to contradict each other, InformationWeek recommends: "The people who do and the people who watch shouldn't report to a ____________________ manager."
(Short Answer)
4.7/5
(24)
To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility.
(True/False)
4.8/5
(39)
The information security function can be placed within the __________.
(Multiple Choice)
4.9/5
(37)
The information security function cannot be placed within protective services.
(True/False)
4.9/5
(40)
Sometimes, contracted employees are self-employed or are employees of an organization hired for a specific, one-time purpose. These people are typically referred to as ____________________.
(Short Answer)
4.8/5
(28)
__________ is the requirement that every employee be able to perform the work of another employee.
(Multiple Choice)
4.9/5
(37)
Showing 41 - 60 of 77
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)