Filters
Question type

Study Flashcards

It is easy to limit a temporary employee's access to only the information required for his or her assigned duties.

A) True
B) False

Correct Answer

verifed

verified

The GIAC family of certifications can be pursued independently or combined to earn a comprehensive certification called the GIAC Security Expert.

A) True
B) False

Correct Answer

verifed

verified

An information security engineer has the responsibility of redesigning and reengineering internal information handling processes so that information is appropriately protected from a wide variety of problems.

A) True
B) False

Correct Answer

verifed

verified

New hire ____________________ should cover policies,security procedures,access levels,and training on the secure use of information systems.

Correct Answer

verifed

verified

In the efforts to maintain effective personnel security practices,one of the threats to an organization's information is the inability to perform the tasks of an employee who is unable or unwilling to perform them.

A) True
B) False

Correct Answer

verifed

verified

A security technician usually reports to a ____ who in turn reports to a(n) ____.


A) security engineer; security manager
B) support staff member; analyst
C) CISO, CEO
D) security manager, CISO

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

The ____________________ covers seven domains of information security knowledge and is considered by some to be a scaled down version of the CISSP.

Correct Answer

verifed

verified

From Schwartz et al.,information security positions can be categorized as those that define,those that build,and those that ____.


A) implement
B) design
C) administer
D) operate

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A specific concern with consultants is their natural desire to share success stories with other clients._________________________

A) True
B) False

Correct Answer

verifed

verified

When conducting security checks on potential employees,organizations must comply with local regulations,including the Fair Credit Reporting Act (FCRA)regarding the use of personal information in employment practices._________________________

A) True
B) False

Correct Answer

verifed

verified

Automatic résumé scanning software can be set up to search for strings of characters that represent professional certifications.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a responsibility of an information security technician?


A) Developing information security requirements for the organization
B) Providing hands-on technical consulting services to teams of technical specialists
C) Establishing procedures for the identification of information assets
D) Managing the development of information security policies

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The ____ examination was developed by the International Society of Forensic Computer Examiners.


A) CCE
B) TICSA
C) SSCP
D) CISM

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Contract workers are brought in by organizations to temporarily fill positions or to supplement the existing workforce._________________________

A) True
B) False

Correct Answer

verifed

verified

It is important to have security clauses and policies as part of employment contracts in place at the time of ____________________ because it is much more difficult to implement such documents with existing employees .

Correct Answer

verifed

verified

CompTIA's Security + certification tests for security knowledge mastery of an individual with no on-the-job network experience,and is focused on CompTIA's line of security equipment.

A) True
B) False

Correct Answer

verifed

verified

A common job title for a security technician in an organization is ____.


A) security manager
B) security engineer
C) security officer
D) security consultant

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

____ should not be allowed to wander freely in and out of buildings.


A) Consultants
B) Business partners
C) Service contractors
D) Temporary workers

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

The ____ takes the lead in the interviewing and hiring process and screens personnel.


A) security manager
B) security technician
C) security consultant
D) CISO

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

The CIFI program is currently being developed to evaluate expertise in the tasks and responsibilities of a security administrator or security manager,including incident response,working with law enforcement,and auditing._________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 133

Related Exams

Show Answer