Deck 17: Human Resources Security

Full screen (f)
exit full mode
Question
To emphasize the importance of security awareness,an organization
should have a security awareness policy document that is provided to all employees.
Use Space or
up arrow
down arrow
to flip the card.
Question
Security awareness,training,and education programs may be needed to
comply with regulations and contractual obligations.
Question
The _______ category is a transitional stage between awareness and training.

A)roles and responsibilities relative to IT systems
B)security basics and literacy
C)education and experience
D)security awareness
Question
The education and experience learning level provides the foundation
for subsequent training by providing a universal baseline of key security terms and concepts.
Question
Complying with regulations and contractual obligations is a benefit of
security awareness,training,and education programs.
Question
Employee behavior is not a critical concern in ensuring the security of
computer systems.
Question
The _________ level focuses on developing the ability and vision to perform complex,multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.

A)security basics and literacy
B)roles and responsibilities relative to IT systems
C)education and experience
D)security awareness
Question
Awareness is used to explain the rules of behavior for using an
agency's information systems and information and establishes a level of expectation on the acceptable use of the information and information systems.
Question
Programmers,developers,and system maintainers require less
advanced security training than other employees.
Question
Having all of the security functions and audit responsibilities reside in
the same person is a wise decision on the part of the organization.
Question
_______ is a benefit of security awareness,training,and education programs to organizations.

A)Improving employee behavior
B)Increasing the ability to hold employees accountable for their actions
C)Mitigating liability of the organization for an employee's behavior
D)All of the above
Question
Security education is most often taught by outside sources.
Question
Many companies incorporate specific e-mail and Internet use policies
into the organization's security policy document.
Question
As part of their contractual obligation,employees should agree and
sign the terms and conditions of their employment contract,which should state their and the organization's responsibilities for information security.
Question
________ is explicitly required for all employees.

A)Security awareness
B)Education and experience
C)Security basics and literacy
D)Roles and responsibilities relative to IT systems
Question
Security basics and literacy is required for those employees,including
contractor employees,who are involved in any way with IT systems.
Question
An employer cannot be held liable for negligent hiring if an
employee causes harm to a third party while acting as an employee.
Question
Awareness only communicates information security policies and
procedures that need to be followed and does not provide the foundation for any sanctions or disciplinary actions imposed for noncompliance.
Question
Security awareness,training,and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ________ and of potential penalties.

A)regulations
B)accountability
C)liability
D)incidents
Question
Employees cannot be expected to follow policies and procedures of
which they are unaware.
Question
________ need training on the development of risk management goals,means of measurement,and the need to lead by example in the area of security awareness.

A)Executives
B)Analysts
C)Managers
D)Trainers
Question
A _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
Question
Any action that threatens one or more of the classic security services of confidentiality,integrity,availability,accountability,authenticity,and reliability in a system constitutes a(n)________.
Question
The principles that should be followed for personnel security are: limited reliance on key employees,separation of duties,and _______.
Question
CERT stands for ___________.

A)Computer Error Response Team
B)Compliance Error Repair Technology
C)Computer Emergency Response Team
D)Compliance Emergency Response Technology
Question
_______ are ways for an awareness program to promote the security message to employees.

A)Posters
B)Newsletters
C)Workshops and training sessions
D)All of the above
Question
A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.

A)disciplinary action
B)company rights
C)policy scope
D)business use only
Question
The four layers of the learning continuum as summarized by NIST SP 800-16 are: security awareness,security basics and literacy,roles and responsibilities relative to IT systems,and the _________ level.
Question
In large and medium-sized organizations,a _________ is responsible for rapidly detecting incidents,minimizing loss and destruction,mitigating the weaknesses that were exploited,and restoring computing services.
Question
A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a ______.

A)CIRT
B)CIRC
C)CSIRT
D)all of the above
Question
The principal problems associated with employee behavior are errors and omissions,_______,and actions by disgruntled employees.
Question
___________ scan critical system files,directories,and services to ensure they have not been changed without proper authorization.

A)Intrusion prevention systems
B)System integrity verification tools
C)Log analysis tools
D)Network and host intrusion detection systems
Question
In general,a ________ program seeks to inform and focus an employee's attention on issues related to security within the organization.
Question
After security basics and literacy,training becomes focused on providing the knowledge,skills,and abilities specific to an individual's _______ relative to IT systems.
Question
________ lists the following security objective with respect to current employees: to ensure that employees,contractors,and third-party users are aware of information security threats and concerns and their responsibilities and liabilities with regard to information security and are equipped to support organizational security policy in the course of their normal work and to reduce the risk of human error.
Question
A _______ policy states that the company may access,monitor,intercept,block access,inspect,copy,disclose,use,destroy,or recover using computer forensics any data covered by this policy.

A)standard of conduct
B)unlawful activity prohibited
C)company rights
D)business use only
Question
There is a need for a continuum of learning programs that starts with _______,builds to training,and evolves into education.
Question
________ is the process of receiving,initial sorting,and prioritizing of information to facilitate its appropriate handling.

A)Incident
B)Triage
C)Constituency
D)Handling
Question
________ can include computer viruses,Trojan horse programs,worms,exploit scripts,and toolkits.

A)Artifacts
B)Vulnerabilities
C)CSIRT
D)Constituencies
Question
From a security point of view,which of the following actions should be done upon the termination of an employee?

A)remove the person's name from all lists of authorized access
B)recover all assets,including employee ID,disks,documents and equipment
C)remove all personal access codes
D)all of the above
Question
Employees have no expectation of ______ in their use of company-provided e-mail or Internet access,even if the communication is personal in nature.
Question
The group of users,sites,networks,or organizations served by the CSIRT is a _______.
Question
The goal of the _______ function is to ensure that all information destined for the incident handling service is channeled through a single focal point regardless of the method by which it arrives for appropriate redistribution and handling within the service.
Question
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
Question
A(n)________ is any file or object found on a system that might be involved in probing or attacking systems and networks or that is being used to defeat security measures.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Human Resources Security
1
To emphasize the importance of security awareness,an organization
should have a security awareness policy document that is provided to all employees.
True
2
Security awareness,training,and education programs may be needed to
comply with regulations and contractual obligations.
True
3
The _______ category is a transitional stage between awareness and training.

A)roles and responsibilities relative to IT systems
B)security basics and literacy
C)education and experience
D)security awareness
B
4
The education and experience learning level provides the foundation
for subsequent training by providing a universal baseline of key security terms and concepts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Complying with regulations and contractual obligations is a benefit of
security awareness,training,and education programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Employee behavior is not a critical concern in ensuring the security of
computer systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The _________ level focuses on developing the ability and vision to perform complex,multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.

A)security basics and literacy
B)roles and responsibilities relative to IT systems
C)education and experience
D)security awareness
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Awareness is used to explain the rules of behavior for using an
agency's information systems and information and establishes a level of expectation on the acceptable use of the information and information systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Programmers,developers,and system maintainers require less
advanced security training than other employees.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Having all of the security functions and audit responsibilities reside in
the same person is a wise decision on the part of the organization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
_______ is a benefit of security awareness,training,and education programs to organizations.

A)Improving employee behavior
B)Increasing the ability to hold employees accountable for their actions
C)Mitigating liability of the organization for an employee's behavior
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Security education is most often taught by outside sources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Many companies incorporate specific e-mail and Internet use policies
into the organization's security policy document.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
As part of their contractual obligation,employees should agree and
sign the terms and conditions of their employment contract,which should state their and the organization's responsibilities for information security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
________ is explicitly required for all employees.

A)Security awareness
B)Education and experience
C)Security basics and literacy
D)Roles and responsibilities relative to IT systems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Security basics and literacy is required for those employees,including
contractor employees,who are involved in any way with IT systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
An employer cannot be held liable for negligent hiring if an
employee causes harm to a third party while acting as an employee.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Awareness only communicates information security policies and
procedures that need to be followed and does not provide the foundation for any sanctions or disciplinary actions imposed for noncompliance.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Security awareness,training,and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ________ and of potential penalties.

A)regulations
B)accountability
C)liability
D)incidents
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Employees cannot be expected to follow policies and procedures of
which they are unaware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
________ need training on the development of risk management goals,means of measurement,and the need to lead by example in the area of security awareness.

A)Executives
B)Analysts
C)Managers
D)Trainers
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Any action that threatens one or more of the classic security services of confidentiality,integrity,availability,accountability,authenticity,and reliability in a system constitutes a(n)________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The principles that should be followed for personnel security are: limited reliance on key employees,separation of duties,and _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
CERT stands for ___________.

A)Computer Error Response Team
B)Compliance Error Repair Technology
C)Computer Emergency Response Team
D)Compliance Emergency Response Technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
_______ are ways for an awareness program to promote the security message to employees.

A)Posters
B)Newsletters
C)Workshops and training sessions
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.

A)disciplinary action
B)company rights
C)policy scope
D)business use only
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The four layers of the learning continuum as summarized by NIST SP 800-16 are: security awareness,security basics and literacy,roles and responsibilities relative to IT systems,and the _________ level.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
In large and medium-sized organizations,a _________ is responsible for rapidly detecting incidents,minimizing loss and destruction,mitigating the weaknesses that were exploited,and restoring computing services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a ______.

A)CIRT
B)CIRC
C)CSIRT
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The principal problems associated with employee behavior are errors and omissions,_______,and actions by disgruntled employees.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
___________ scan critical system files,directories,and services to ensure they have not been changed without proper authorization.

A)Intrusion prevention systems
B)System integrity verification tools
C)Log analysis tools
D)Network and host intrusion detection systems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
In general,a ________ program seeks to inform and focus an employee's attention on issues related to security within the organization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
After security basics and literacy,training becomes focused on providing the knowledge,skills,and abilities specific to an individual's _______ relative to IT systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
________ lists the following security objective with respect to current employees: to ensure that employees,contractors,and third-party users are aware of information security threats and concerns and their responsibilities and liabilities with regard to information security and are equipped to support organizational security policy in the course of their normal work and to reduce the risk of human error.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A _______ policy states that the company may access,monitor,intercept,block access,inspect,copy,disclose,use,destroy,or recover using computer forensics any data covered by this policy.

A)standard of conduct
B)unlawful activity prohibited
C)company rights
D)business use only
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
There is a need for a continuum of learning programs that starts with _______,builds to training,and evolves into education.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
________ is the process of receiving,initial sorting,and prioritizing of information to facilitate its appropriate handling.

A)Incident
B)Triage
C)Constituency
D)Handling
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
________ can include computer viruses,Trojan horse programs,worms,exploit scripts,and toolkits.

A)Artifacts
B)Vulnerabilities
C)CSIRT
D)Constituencies
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
From a security point of view,which of the following actions should be done upon the termination of an employee?

A)remove the person's name from all lists of authorized access
B)recover all assets,including employee ID,disks,documents and equipment
C)remove all personal access codes
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Employees have no expectation of ______ in their use of company-provided e-mail or Internet access,even if the communication is personal in nature.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The group of users,sites,networks,or organizations served by the CSIRT is a _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The goal of the _______ function is to ensure that all information destined for the incident handling service is channeled through a single focal point regardless of the method by which it arrives for appropriate redistribution and handling within the service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A(n)________ is any file or object found on a system that might be involved in probing or attacking systems and networks or that is being used to defeat security measures.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.