Question 1
To maintain a secure facility, contract employees (such as electricians or vendor repair staff) should be escorted from room to room, as well as into and out of the facility.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 2
____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization’s security technology is properly implemented.Selected Answer: 
 Security techniciansCorrect Answer: 
 Security techniciansQuestion 3
____ is a cornerstone in the protection of information assets and in the prevention of financial loss.Selected Answer: 
 Separation of dutiesCorrect Answer: 
 Separation of dutiesQuestion 4
The most common certification expected of a Chief Information Security Officer is the _____ .Selected Answer: 
 CISSPCorrect Answer: 
 CISSPQuestion 5
____ are accountable for the day-to-day operation of the information security program and generally report to the top information security officer in the organization.Selected Answer: 
 Security managersCorrect Answer: 
 Security managersQuestion 6
____ is the requirement that every employee be able to perform the work of another employee.Selected Answer: 
 Task rotationCorrect Answer: 
 Task rotationQuestion 7
The information security function can be placed within ____.Selected Answer: 
 All of the aboveCorrect Answer: 
 All of the aboveQuestion 8
Many information security professionals enter the field from traditional ____ assignments.Selected Answer: 
 information technologyCorrect Answer: 
 information technologyQuestion 9
The position of security technician is often offered as an entry-level position.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 10
Friendly departures include termination for cause, permanent downsizing, temporary lay-off, and some instances of quitting.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 11
The idea that employees should be provided access to the minimum amount of information for the minimum amount of time necessary for them to perform their duties is known as (the) __________ .Selected Answer: 
 principle of least privilegeCorrect Answer: 
 principle of least privilegeQuestion 12
In the Schwartz, Erwin, Weafer, and Briney model, ____ are the real techies, who create and install security solutions.Selected Answer: 
 buildersCorrect Answer: 
 buildersQuestion 13
In general, the research seems to suggest that while many organizations believe that the CISO/CSO should function as an independent, executive-level decision maker, infomation security and the ____ department are currently too closely aligned to separate into two departments.Selected Answer: 
 information technologyCorrect Answer: 
 information technologyQuestion 14
In many organizations, the staff of information security teams lacks established roles and responsibilities, in part because information security has only recently emerged as a separate discipline.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 15
The security manager position is much more general than that of CISO.Selected Answer: 
 FalseCorrect Answer: 
 False
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH11
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment