Exam 17: Human Resources Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Employee behavior is not a critical concern in ensuring the security of
computer systems.
Free
(True/False)
4.8/5
(26)
Correct Answer:
False
________ need training on the development of risk management goals,means of measurement,and the need to lead by example in the area of security awareness.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
A
_______ is a benefit of security awareness,training,and education programs to organizations.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
D
A(n)________ is any file or object found on a system that might be involved in probing or attacking systems and networks or that is being used to defeat security measures.
(Short Answer)
4.9/5
(33)
The _______ category is a transitional stage between awareness and training.
(Multiple Choice)
5.0/5
(42)
The four layers of the learning continuum as summarized by NIST SP 800-16 are: security awareness,security basics and literacy,roles and responsibilities relative to IT systems,and the _________ level.
(Short Answer)
4.9/5
(34)
Many companies incorporate specific e-mail and Internet use policies
into the organization's security policy document.
(True/False)
4.9/5
(38)
Security awareness,training,and education programs may be needed to
comply with regulations and contractual obligations.
(True/False)
4.7/5
(33)
The _________ level focuses on developing the ability and vision to perform complex,multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.
(Multiple Choice)
4.9/5
(41)
An employer cannot be held liable for negligent hiring if an
employee causes harm to a third party while acting as an employee.
(True/False)
4.8/5
(33)
Programmers,developers,and system maintainers require less
advanced security training than other employees.
(True/False)
4.8/5
(35)
Security basics and literacy is required for those employees,including
contractor employees,who are involved in any way with IT systems.
(True/False)
4.9/5
(33)
________ is the process of receiving,initial sorting,and prioritizing of information to facilitate its appropriate handling.
(Multiple Choice)
4.8/5
(26)
_______ are ways for an awareness program to promote the security message to employees.
(Multiple Choice)
4.9/5
(27)
A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.
(Multiple Choice)
4.8/5
(40)
In general,a ________ program seeks to inform and focus an employee's attention on issues related to security within the organization.
(Short Answer)
4.9/5
(28)
Having all of the security functions and audit responsibilities reside in
the same person is a wise decision on the part of the organization.
(True/False)
4.8/5
(30)
Employees have no expectation of ______ in their use of company-provided e-mail or Internet access,even if the communication is personal in nature.
(Short Answer)
4.7/5
(34)
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
(Short Answer)
4.9/5
(32)
After security basics and literacy,training becomes focused on providing the knowledge,skills,and abilities specific to an individual's _______ relative to IT systems.
(Short Answer)
4.9/5
(35)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)