Exam 13: Security Policy Design and Implementation
The process of reviewing records of network computer activity is called which of the following?
C
What points should a third-party access policy include? List at least three.
This third-party access policy should include the following points at a minimum:
Access should be permitted only for company business.
Third parties should be subject to a security screening process.
Precise methods for allowing and denying connectivity should be defined.
The duration of permitted access and the details of terminating access should be defined.
Penalties and consequences for violating access terms should be defined because they are different from those for employees.
When should you update the security policy?
You should update the security policy based on incidents reported as a result of ongoing security monitoring and any new risks your company faces.Any changes to the policy should then be made available to all employees,either by e-mail or by posting the changes on the company's Web site or intranet.
________________ clauses exist in acceptable use policies so that companies can discipline employees whose computer activities interfere with productivity.
Describe a remote access and wireless connection policy and the use of role-based authentication.Include two-factor authentication in your discussion.
SNA starts with the assumption that a system or network will be ________________.
Which of the following defines how employees should use the organization's computing resources?
____________________ risk is the amount of risk left over after countermeasures are implemented.
Which of the following best describes a Monte Carlo simulation?
MATCHING
-a private network that a company sets up as an extension of its corporate intranet
MATCHING
-authentication that requires more than one form of verification for a user to be granted access
What are the three levels of escalation of threat or security incidents? Describe them.
MATCHING
-a document that details additional access options and responsibilities of users with privileged access to resources
MATCHING
-a method of authentication that grants users limited system access based on their assigned role in the company
An extranet is a backup network that you can use if the main network fails.
What are three questions you should ask in deciding how your organization should perform risk analysis?
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)