Exam 13: Security Policy Design and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of reviewing records of network computer activity is called which of the following?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

What points should a third-party access policy include? List at least three.

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

This third-party access policy should include the following points at a minimum:
Access should be permitted only for company business.
Third parties should be subject to a security screening process.
Precise methods for allowing and denying connectivity should be defined.
The duration of permitted access and the details of terminating access should be defined.
Penalties and consequences for violating access terms should be defined because they are different from those for employees.

When should you update the security policy?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

You should update the security policy based on incidents reported as a result of ongoing security monitoring and any new risks your company faces.Any changes to the policy should then be made available to all employees,either by e-mail or by posting the changes on the company's Web site or intranet.

What is the purpose of a privileged access policy?

(Essay)
4.9/5
(42)

________________ clauses exist in acceptable use policies so that companies can discipline employees whose computer activities interfere with productivity.

(Short Answer)
4.9/5
(40)

Which of the following would be considered a vulnerability?

(Multiple Choice)
4.8/5
(31)

Describe a remote access and wireless connection policy and the use of role-based authentication.Include two-factor authentication in your discussion.

(Essay)
5.0/5
(39)

SNA starts with the assumption that a system or network will be ________________.

(Short Answer)
4.9/5
(29)

Which of the following defines how employees should use the organization's computing resources?

(Multiple Choice)
4.7/5
(30)

Which best defines residual risk?

(Multiple Choice)
4.7/5
(32)

____________________ risk is the amount of risk left over after countermeasures are implemented.

(Short Answer)
4.7/5
(30)

Which of the following best describes a Monte Carlo simulation?

(Multiple Choice)
4.9/5
(30)

What are the four steps of Threat and Risk Assessment?

(Short Answer)
4.9/5
(39)

MATCHING -a private network that a company sets up as an extension of its corporate intranet

(Multiple Choice)
4.7/5
(38)

MATCHING -authentication that requires more than one form of verification for a user to be granted access

(Multiple Choice)
4.9/5
(24)

What are the three levels of escalation of threat or security incidents? Describe them.

(Essay)
4.8/5
(33)

MATCHING -a document that details additional access options and responsibilities of users with privileged access to resources

(Multiple Choice)
4.9/5
(45)

MATCHING -a method of authentication that grants users limited system access based on their assigned role in the company

(Multiple Choice)
4.8/5
(31)

An extranet is a backup network that you can use if the main network fails.

(True/False)
5.0/5
(38)

What are three questions you should ask in deciding how your organization should perform risk analysis?

(Essay)
4.8/5
(27)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)