Exam 17: Human Resources Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Employee behavior is not a critical concern in ensuring the security of computer systems.

Free
(True/False)
4.8/5
(26)
Correct Answer:
Verified

False

________ need training on the development of risk management goals,means of measurement,and the need to lead by example in the area of security awareness.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

A

_______ is a benefit of security awareness,training,and education programs to organizations.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

A(n)________ is any file or object found on a system that might be involved in probing or attacking systems and networks or that is being used to defeat security measures.

(Short Answer)
4.9/5
(33)

The _______ category is a transitional stage between awareness and training.

(Multiple Choice)
5.0/5
(42)

The four layers of the learning continuum as summarized by NIST SP 800-16 are: security awareness,security basics and literacy,roles and responsibilities relative to IT systems,and the _________ level.

(Short Answer)
4.9/5
(34)

Many companies incorporate specific e-mail and Internet use policies into the organization's security policy document.

(True/False)
4.9/5
(38)

Security awareness,training,and education programs may be needed to comply with regulations and contractual obligations.

(True/False)
4.7/5
(33)

The _________ level focuses on developing the ability and vision to perform complex,multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.

(Multiple Choice)
4.9/5
(41)

An employer cannot be held liable for negligent hiring if an employee causes harm to a third party while acting as an employee.

(True/False)
4.8/5
(33)

Programmers,developers,and system maintainers require less advanced security training than other employees.

(True/False)
4.8/5
(35)

Security basics and literacy is required for those employees,including contractor employees,who are involved in any way with IT systems.

(True/False)
4.9/5
(33)

________ is the process of receiving,initial sorting,and prioritizing of information to facilitate its appropriate handling.

(Multiple Choice)
4.8/5
(26)

_______ are ways for an awareness program to promote the security message to employees.

(Multiple Choice)
4.9/5
(27)

A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.

(Multiple Choice)
4.8/5
(40)

In general,a ________ program seeks to inform and focus an employee's attention on issues related to security within the organization.

(Short Answer)
4.9/5
(28)

Having all of the security functions and audit responsibilities reside in the same person is a wise decision on the part of the organization.

(True/False)
4.8/5
(30)

Employees have no expectation of ______ in their use of company-provided e-mail or Internet access,even if the communication is personal in nature.

(Short Answer)
4.7/5
(34)

Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.

(Short Answer)
4.9/5
(32)

After security basics and literacy,training becomes focused on providing the knowledge,skills,and abilities specific to an individual's _______ relative to IT systems.

(Short Answer)
4.9/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)