Exam 11: Personnel and Security
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
The most common qualification for a CISO includes the CISSP and CISM certifications.
Free
(True/False)
4.8/5
(46)
Correct Answer:
True
InfoSec is a profession with little personnel turnover - most InfoSec professionals stay in their positions for a very long time.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
Which of the following is a responsibility of an InfoSec technician?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
A security manager is accountable for the day-to-day operation of all or part of the InfoSec program.
(True/False)
4.7/5
(36)
Maintaining a secure environment requires that the information security (InfoSec)department be carefully structured and staffed with appropriately skilled and screened personnel.
(True/False)
4.8/5
(37)
Which of the following policies requires that two individuals review and approve each other's work before the task is considered complete?
(Multiple Choice)
4.8/5
(26)
A technically qualified individual who may configure firewalls and IDPSs, implement security software,diagnose and troubleshoot problems,and coordinate with systems and network administrators to ensure that security technical controls are properly implemented is known as a security architect.
(True/False)
4.8/5
(31)
According to Schwartz et al.,employees who create and install security solutions fall under which classification of InfoSec positions?
(Multiple Choice)
4.8/5
(29)
Which of the following is NOT a task that must be performed if an employee is terminated?
(Multiple Choice)
5.0/5
(35)
It is the responsibility of a _______________________ to develop appropriate InfoSec policies,standards,guidelines,and procedures.
(Short Answer)
4.8/5
(34)
Temporary hires called contract employees - or simply contractors - should not be allowed to do what?
(Multiple Choice)
4.9/5
(35)
a member of the general business community having an information security related role
(Multiple Choice)
4.7/5
(34)
an organization that developed a series of technical security certifications such as the GIAC
(Multiple Choice)
4.9/5
(36)
Briefly describe the classifications of InfoSec positions as defined by Schwartz et al.
(Essay)
4.8/5
(36)
Which of the following is NOT a typical task performed by the security technician?
(Multiple Choice)
4.9/5
(28)
a member of the IT community often responsible for complex operating system programs
(Multiple Choice)
4.8/5
(28)
Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program?
(Multiple Choice)
5.0/5
(35)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)