Académique Documents
Professionnel Documents
Culture Documents
The general management community of interest must work with the information security professionals to integrate solid information security concepts into the personnel management practices of the organization. Student Response A. True B. False Score:
2.
Value 100%
Correct Answer
Feedback
1/1
In many organizations, information security teams lacks established roles and responsibilities. Student Response A. True B. False Score:
3.
Value 100%
Correct Answer
Feedback
1/1
In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates. Student Response A. True B. False Score: 1/1 Value 100% Correct Answer Feedback
4.
Information security should be visible to the users. Student Response A. True B. False General Feedback: Score:
5.
Value
Correct Answer
Feedback
100% This question is not a good one! The statement can be interpreted from various perspectives. 1/1
The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions. Student Response A. True B. False Score:
6.
Value 100%
Correct Answer
Feedback
1/1
The organization should integrate the security awareness education into a new hires ongoing job orientation and make it a part of every employees on-the-job security training. Student Response A. True B. False Score: 1/1 Value 100% Correct Answer Feedback
7.
To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility. Student Response A. True B. False Score:
8.
Value 100%
Correct Answer
Feedback
1/1
Organizations are not required by law to protect employee information that is sensitive or personal. Student Response A. True B. False Score:
9.
Value
Correct Answer
Feedback
100% 1/1
Upper management should learn more about the budgetary needs of the information security function and the positions within it. Student Response A. True B. False Score: 1/1 Value 100% Correct Answer Feedback
10.
Many hiring managers in the information security field prefer to recruit a security professional who has already proven HR skills. Student Response A. True B. False Score:
11.
Value
Correct Answer
Feedback
100% 1/1
Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. Student Response A. True B. False Score: 1/1 100% Value Correct Answer Feedback
12.
The information security function can be placed within the ____. Student Response A. insurance and risk management function B. administrative services function C. legal department D. All of the above Score: 1/1 100% Value Correct Answer Feedback
13.
Many information security professionals enter the field from traditional ____ assignments. Student Response A. HR B. BA C. IT D. All of the above Score:
14.
Value
Correct Answer
Feedback
100%
1/1
____ are the real techies who create and install security solutions. Student Response A. Builders B. Administrators C. Senior managers D. Definers Score:
15.
Value 100%
Correct Answer
Feedback
1/1
____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organizations security technology is properly implemented. Student Response A. CSOs B. CISOs C. Security managers D. Security technicians Score: 1/1 100% Value Correct Answer Feedback
16.
The breadth and depth covered in each of the domains makes the ____ one of the most difficultto-attain certifications on the market. Student Response A. NSA B. CISO C. CISSP D. ISEP Score:
17.
Value
Correct Answer
Feedback
100%
1/1
The applicant for the CISA must provide evidence of ____ years of professional work experience in the field of information security, with a waiver or substitution of up to two years for education or previous certification. Student Response A. five B. eight C. ten D. twelve Score: 1/1 Value 100% Correct Answer Feedback
18.
Many organizations use a(n) ____ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employees tenure in the organization. Student Response A. hostile B. departure C. exit D. termination Score:
19.
Value
Correct Answer
Feedback
100%
1/1
____ is the requirement that every employee be able to perform the work of another employee. Student Response A. Two-man control B. Collusion C. Duty exchange D. Task rotation Score: 1/1 100% Value Correct Answer Feedback