logo image

Info Sec Chapter 11 Security and Personnel

To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility.
A) True
B) False
true
The SSCP examination is much more rigorous that the CISSP examination.
A) True
B) False
false [other way around]
CompTIA offers a vendor-specific certification program called the Security+ certification.
A) True
B) False
false [vendor-neutral]
The CISSP concentration concentrations are available for CISSPs to demonstrate knowledge that is already a part of the CISSP CBK.
A) True
B) False
true
A mandatory furlough provides the organization with the ability to audit the work of an individual. _________________________
A) True
B) False
false [mandatory vacation]
The most common credential for a CISO-level position is the Security+ certification. _________________________
A) True
B) False
fALSE
Which of the following is not one of the categories of positions as defined by Schwartz, Erwin, Weafer, and Briney?
A) definer
B) user
C) builder
D) administrator
b)user
The ISSEP allows CISSP certificate holders to demonstrate expert knowledge of all of these except __________.
A) Systems security engineering
B) Technical management
C) International laws
D) Certification and accreditation/risk management framework
C)international laws
ISSMP stands for Information Systems Security Monitoring Professional. _________________________
A) True
B) False
false [Information System Security Management Professional]
Many who move to business-oriented information security were formerly__________ who were often involved in national security or cybersecurity .
A) marketing managers
B) military personnel
C) business analysts
D) lawyers
B) military personnel
Security managers accomplish objectives identified by the CISO and resolve issues identified by technicians. _________________________
A) True
B) False
true
Many enter the field of information security from technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.
A) networking experts or systems administrators
B) database administrators
C) programmers
D) All of the above
d) all of the above
__________ is a cornerstone in the protection of information assets and in the prevention of financial loss.
A) Fire suppression
B) Business separation
C) Separation of duties
D) Collusion
C) separation of duties
The International Society of Forensic Computer Examiners (ISFCE) offers which certifications?
A) Certified Computer Examiner (CCE)
B) Master Certified Computer Examiner (MCCE)
C) both a & b
D) neither a nor b
C) both a & b
Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________,
A) technician, manager
B) manager, engineer
C) manager, technician
D) technician, executive
C) manager, technician
The ISSMP examination is designed to provide CISSPs with a mechanism to demonstrate competence in __________.
A) ?Enterprise security management practices?
B) Security management practices
C) Business continuity planning and disaster recovery planning
D) All of the above
D) All of the above
The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions.
A) True
B) False
true
A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position.
A) True
B) False
false
Many organizations use a(n) __________ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee’s tenure in the organization.
A) hostile
B) departure
C) exit
D) termination
C) exit
The information security function can be placed within the __________.
A) insurance and risk management function
B) administrative services function
C) legal department
D) All of the above
D) all of the above

Need essay sample on "Info Sec Chapter 11 Security and Personnel"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy