Exam 11: Security and Personnel
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
It is important to gather employee ____________________ early about the information security program and respond to it quickly.
(Short Answer)
4.9/5
(29)
__________ is a cornerstone in the protection of information assets and in the prevention of financial loss.
(Multiple Choice)
4.9/5
(29)
The CISSP-ISSEP concentration focuses on the knowledge areas that are part of enterprise security management.
(True/False)
4.7/5
(40)
The general management community of interest must plan for the proper staffing of the information security function. _________________________
(True/False)
4.7/5
(38)
Upper management should learn more about the budgetary needs of the information security function and the positions within it. _________________________
(True/False)
4.8/5
(38)
The ____________________ acts as the spokesperson for the information security team.
(Short Answer)
4.8/5
(32)
The former System Administration, Networking, and Security Organization is now better known as __________.
(Multiple Choice)
4.7/5
(39)
ISSMP stands for Information Systems Security MonitoringProfessional. _________________________
(True/False)
4.9/5
(36)
Once a candidate has accepted a job offer, the employment ____________________ becomes an important security instrument.
(Short Answer)
4.9/5
(33)
Related to the concept of separation of duties is that of ____________________, the requirement that two individuals review and approve each other's work before the task is categorized as finished.
(Short Answer)
4.8/5
(46)
The most common credential for a CISO-level position is the Security+ certification. _________________________
(True/False)
4.9/5
(33)
__________ are hired by the organization to serve in a temporary position or to supplement the existing workforce.
(Multiple Choice)
4.8/5
(35)
Certifications are designed to recognize ____________________ in their respective fields.
(Short Answer)
4.7/5
(34)
ISSAP stands for Information Systems Security Architecture Professional. _________________________
(True/False)
4.9/5
(42)
ISACA offers the CGEIT as well as the CISA and ____________________ certifications.
(Short Answer)
4.8/5
(35)
SANS developed a series of technical security certifications in 1999 that are known as the Global Information ____________________ Certification or GIAC family of certifications.
(Short Answer)
4.8/5
(34)
The breadth and depth covered in each of the domains makes the __________ one of the most difficult-to-attain certifications on the market.
(Multiple Choice)
4.9/5
(35)
Showing 61 - 77 of 77
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)