Part 7 Flashcards

0
Q

One of the greatest security assets is a business’s own employees, but only if they have been properly trained to comply with ____and to identify potential security problems.

A

security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Train Employees: _____

A

Develop a Culture of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Many employees don’t understand the significance of various security policies and implementations. As men- tioned previously, they consider these policies nothing more than an _____.

A

inconvenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gaining the support and allegiance of employees takes time, but it is time well spent. Begin by carefully explaining the reasons behind any ____

A

security implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One of the reasons could be ensuring employee _____, but focus primarily on the security issues.

A

productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File sharing using LimeWire and eMule might keep employees away from work, but they can also open up holes in a ____.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Downloading and installing _____can install malicious software that can infect user systems, causing their computers to function slowly or not at all.

A

unapproved software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify and Utilize ____of the Operating System and Applications

A

Built-In Security Features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Many organizations and systems administrators state that they cannot create a secure organization because they have limited resources and simply do not have the funds to purchase robust security tools. This is a ridicu- lous approach to security because all operating systems and many applications include ____ that require no organizational resources other than time to identify and configure these tools.

A

security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For Microsoft Windows operating systems, a terrific resource is the online Microsoft ____ Library.33 Under the Solutions Accelerators link you can find security guides for all recent Microsoft Windows operating systems. Figure 1.6 shows the table of contents for Windows 2008 Server.

A

TechNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly