Deck 10: Security Policies

Full screen (f)
exit full mode
Question
Security policies toward programmers and web developers are developmental policies.
Use Space or
up arrow
down arrow
to flip the card.
Question
A security policy is a document that defines how an organization deals with some aspect of security.
Question
Principal of least privilege means that no one person can perform critical tasks.
Question
Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

A)Desktop configuration
B)Instant messaging
C)USB drives
D)None of the above
Question
New employees should receive a copy of the company's __________ policies.

A)Business continuation
B)Disaster recovery
C)Security/acceptable use
D)None of the above
Question
You cannot disable some USB devices from end-user computers and allow others.
Question
Passwords are an area of user policies.
Question
On an employee's last day of work,his workstation hard drive should be searched.
Question
One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.
Question
Procedures for adding users,removing users,and dealing with security issues are examples of ___________ policies.

A)User
B)Computer
C)System administration
D)Password
Question
An organization should not permit end users to install anything on their computer.
Question
The plan to return a business to full normal operations is ____________

A)BCP
B)DRP
C)BIA
D)ALE
Question
__________ is the most obvious reason for organizations to provide their users with Internet access.

A)Email
B)Job searching
C)Emergency communications
D)None of the above
Question
Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?

A)Email
B)Online training
C)Web meetings
D)Online shopping during a break time
Question
Which of the following should NOT be a part of an organization's policy regarding email attachments?

A)It was an expected attachment.
B)It came from a known source,and the source is confirmed.
C)It appears to be a legitimate business document.
D)None of the above
Question
A document that defines how an organization deals with some aspect of security is a(n)__________.

A)Security policy
B)Business plan
C)Security update
D)None of the above
Question
The background,screensaver,font size,and resolution are elements of _______.

A)Desktop configuration
B)File extensions
C)Passwords
D)None of the above
Question
Standards are specific instructions on how to handle a specific issue.
Question
A good password should have at least eight characters and use all lowercase letters.
Question
Passwords,Internet use,email attachments,software installation,instant messaging,and desktop configuration are areas of ______.

A)Computer policies
B)User policies
C)Documentation
D)Network policies
Question
When an employee leaves,all _______ should be terminated.

A)Web histories
B)Logins
C)Desktops
D)Passwords
Question
The conflict between the users' goal for unfettered access to data and the security administrator's goal to protect that data is an issue of ______________.

A)System administration
B)Access control
C)Password protection
D)Social engineering
Question
If you experience a denial-of-service attack,you can use firewall logs to determine the _______ from which the attack originated.

A)Computer operating system
B)Computer manufacturer
C)IP address
D)None of the above
Question
The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.

A)Implicit deny
B)Least privilege
C)Separation of duty
D)Job rotation
Question
If you determine a virus has struck a system,the first step is to _________.

A)Scan and clean infected systems
B)Log the incident
C)Unplug the machines from the network
D)Notify appropriate organization leaders
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Security Policies
1
Security policies toward programmers and web developers are developmental policies.
True
2
A security policy is a document that defines how an organization deals with some aspect of security.
True
3
Principal of least privilege means that no one person can perform critical tasks.
False
4
Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

A)Desktop configuration
B)Instant messaging
C)USB drives
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
New employees should receive a copy of the company's __________ policies.

A)Business continuation
B)Disaster recovery
C)Security/acceptable use
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
You cannot disable some USB devices from end-user computers and allow others.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Passwords are an area of user policies.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
On an employee's last day of work,his workstation hard drive should be searched.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Procedures for adding users,removing users,and dealing with security issues are examples of ___________ policies.

A)User
B)Computer
C)System administration
D)Password
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
An organization should not permit end users to install anything on their computer.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The plan to return a business to full normal operations is ____________

A)BCP
B)DRP
C)BIA
D)ALE
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
__________ is the most obvious reason for organizations to provide their users with Internet access.

A)Email
B)Job searching
C)Emergency communications
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?

A)Email
B)Online training
C)Web meetings
D)Online shopping during a break time
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following should NOT be a part of an organization's policy regarding email attachments?

A)It was an expected attachment.
B)It came from a known source,and the source is confirmed.
C)It appears to be a legitimate business document.
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A document that defines how an organization deals with some aspect of security is a(n)__________.

A)Security policy
B)Business plan
C)Security update
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
The background,screensaver,font size,and resolution are elements of _______.

A)Desktop configuration
B)File extensions
C)Passwords
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Standards are specific instructions on how to handle a specific issue.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
A good password should have at least eight characters and use all lowercase letters.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Passwords,Internet use,email attachments,software installation,instant messaging,and desktop configuration are areas of ______.

A)Computer policies
B)User policies
C)Documentation
D)Network policies
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
When an employee leaves,all _______ should be terminated.

A)Web histories
B)Logins
C)Desktops
D)Passwords
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
The conflict between the users' goal for unfettered access to data and the security administrator's goal to protect that data is an issue of ______________.

A)System administration
B)Access control
C)Password protection
D)Social engineering
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
If you experience a denial-of-service attack,you can use firewall logs to determine the _______ from which the attack originated.

A)Computer operating system
B)Computer manufacturer
C)IP address
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.

A)Implicit deny
B)Least privilege
C)Separation of duty
D)Job rotation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
If you determine a virus has struck a system,the first step is to _________.

A)Scan and clean infected systems
B)Log the incident
C)Unplug the machines from the network
D)Notify appropriate organization leaders
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.