Deck 17: Human Resources Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 17: Human Resources Security
1
As part of their contractual obligation,employees should agree and
sign the terms and conditions of their employment contract,which should state their and the organization's responsibilities for information security.
sign the terms and conditions of their employment contract,which should state their and the organization's responsibilities for information security.
True
2
Awareness is used to explain the rules of behavior for using an
agency's information systems and information and establishes a level of expectation on the acceptable use of the information and information systems.
agency's information systems and information and establishes a level of expectation on the acceptable use of the information and information systems.
True
3
The education and experience learning level provides the foundation
for subsequent training by providing a universal baseline of key security terms and concepts.
for subsequent training by providing a universal baseline of key security terms and concepts.
False
4
Security awareness,training,and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ________ and of potential penalties.
A)regulations
B)accountability
C)liability
D)incidents
A)regulations
B)accountability
C)liability
D)incidents
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Employee behavior is not a critical concern in ensuring the security of
computer systems.
computer systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Security basics and literacy is required for those employees,including
contractor employees,who are involved in any way with IT systems.
contractor employees,who are involved in any way with IT systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
To emphasize the importance of security awareness,an organization
should have a security awareness policy document that is provided to all employees.
should have a security awareness policy document that is provided to all employees.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
An employer cannot be held liable for negligent hiring if an
employee causes harm to a third party while acting as an employee.
employee causes harm to a third party while acting as an employee.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Many companies incorporate specific e-mail and Internet use policies
into the organization's security policy document.
into the organization's security policy document.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The _______ category is a transitional stage between awareness and training.
A)roles and responsibilities relative to IT systems
B)security basics and literacy
C)education and experience
D)security awareness
A)roles and responsibilities relative to IT systems
B)security basics and literacy
C)education and experience
D)security awareness
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Security awareness,training,and education programs may be needed to
comply with regulations and contractual obligations.
comply with regulations and contractual obligations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The _________ level focuses on developing the ability and vision to perform complex,multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes.
A)security basics and literacy
B)roles and responsibilities relative to IT systems
C)education and experience
D)security awareness
A)security basics and literacy
B)roles and responsibilities relative to IT systems
C)education and experience
D)security awareness
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
_______ is a benefit of security awareness,training,and education programs to organizations.
A)Improving employee behavior
B)Increasing the ability to hold employees accountable for their actions
C)Mitigating liability of the organization for an employee's behavior
D)All of the above
A)Improving employee behavior
B)Increasing the ability to hold employees accountable for their actions
C)Mitigating liability of the organization for an employee's behavior
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Security education is most often taught by outside sources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
________ is explicitly required for all employees.
A)Security awareness
B)Education and experience
C)Security basics and literacy
D)Roles and responsibilities relative to IT systems
A)Security awareness
B)Education and experience
C)Security basics and literacy
D)Roles and responsibilities relative to IT systems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Programmers,developers,and system maintainers require less
advanced security training than other employees.
advanced security training than other employees.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Employees cannot be expected to follow policies and procedures of
which they are unaware.
which they are unaware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Awareness only communicates information security policies and
procedures that need to be followed and does not provide the foundation for any sanctions or disciplinary actions imposed for noncompliance.
procedures that need to be followed and does not provide the foundation for any sanctions or disciplinary actions imposed for noncompliance.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Having all of the security functions and audit responsibilities reside in
the same person is a wise decision on the part of the organization.
the same person is a wise decision on the part of the organization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Complying with regulations and contractual obligations is a benefit of
security awareness,training,and education programs.
security awareness,training,and education programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a ______.
A)CIRT
B)CIRC
C)CSIRT
D)all of the above
A)CIRT
B)CIRC
C)CSIRT
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
In general,a(n)________ program seeks to inform and focus an employee's attention on issues related to security within the organization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The principles that should be followed for personnel security are: limited reliance on key employees,separation of duties,and _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
There is a need for a continuum of learning programs that starts with _______,builds to training,and evolves into education.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
________ lists the following security objective with respect to current employees: "to ensure that employees,contractors,and third-party users are aware of information security threats and concerns and their responsibilities and liabilities with regard to information security and are equipped to support organizational security policy in the course of their normal work and to reduce the risk of human error".
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company.
A)disciplinary action
B)company rights
C)policy scope
D)business use only
A)disciplinary action
B)company rights
C)policy scope
D)business use only
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
After security basics and literacy,training becomes focused on providing the knowledge,skills,and abilities specific to an individual's _______ relative to IT systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
From a security point of view,which of the following actions should be done upon the termination of an employee?
A)remove the person's name from all lists of authorized access
B)recover all assets,including employee ID,disks,documents and equipment
C)remove all personal access codes
D)all of the above
A)remove the person's name from all lists of authorized access
B)recover all assets,including employee ID,disks,documents and equipment
C)remove all personal access codes
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
In large and medium-sized organizations,a(n)_________ is responsible for rapidly detecting incidents,minimizing loss and destruction,mitigating the weaknesses that were exploited,and restoring computing services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Any action that threatens one or more of the classic security services of confidentiality,integrity,availability,accountability,authenticity,and reliability in a system constitutes a(n)________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
________ can include computer viruses,Trojan horse programs,worms,exploit scripts,and toolkits.
A)Artifacts
B)Vulnerabilities
C)CSIRT
D)Constituencies
A)Artifacts
B)Vulnerabilities
C)CSIRT
D)Constituencies
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A(n)_______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
________ is the process of receiving,initial sorting,and prioritizing of information to facilitate its appropriate handling.
A)Incident
B)Triage
C)Constituency
D)Handling
A)Incident
B)Triage
C)Constituency
D)Handling
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
CERT stands for ___________.
A)Computer Error Response Team
B)Compliance Error Repair Technology
C)Computer Emergency Response Team
D)Compliance Emergency Response Technology
A)Computer Error Response Team
B)Compliance Error Repair Technology
C)Computer Emergency Response Team
D)Compliance Emergency Response Technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A _______ policy states that the company may access,monitor,intercept,block access,inspect,copy,disclose,use,destroy,or recover using computer forensics any data covered by this policy.
A)standard of conduct
B)unlawful activity prohibited
C)company rights
D)business use only
A)standard of conduct
B)unlawful activity prohibited
C)company rights
D)business use only
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_______ are ways for an awareness program to promote the security message to employees.
A)Posters
B)Newsletters
C)Workshops and training sessions
D)All of the above
A)Posters
B)Newsletters
C)Workshops and training sessions
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The four layers of the learning continuum as summarized by NIST SP 800-16 are: security awareness,security basics and literacy,roles and responsibilities relative to IT systems,and the _________ level.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
________ need training on the development of risk management goals,means of measurement,and the need to lead by example in the area of security awareness.
A)Executives
B)Analysts
C)Managers
D)Trainers
A)Executives
B)Analysts
C)Managers
D)Trainers
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The principal problems associated with employee behavior are errors and omissions,_______,and actions by disgruntled employees.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
___________ scan critical system files,directories,and services to ensure they have not been changed without proper authorization.
A)Intrusion prevention systems
B)System integrity verification tools
C)Log analysis tools
D)Network and host intrusion detection systems
A)Intrusion prevention systems
B)System integrity verification tools
C)Log analysis tools
D)Network and host intrusion detection systems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Employees have no expectation of ______ in their use of company-provided e-mail or Internet access,even if the communication is personal in nature.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The group of users,sites,networks,or organizations served by the CSIRT is a(n)_______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A(n)________ is any file or object found on a system that might be involved in probing or attacking systems and networks or that is being used to defeat security measures.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The goal of the _______ function is to ensure that all information destined for the incident handling service is channeled through a single focal point regardless of the method by which it arrives for appropriate redistribution and handling within the service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck