Policies and Procedures Flashcards
what documented procedures determines the appropriate course of action if there is a security breach?
Security Procedures
physical security, document security and network security are all covered in what Policy?
The Security Policy
What might government agencies that work with confidential information require from you before granting a contract?
Your security certified by external auditors
Which organization certifies the functionality of security products?
ICSA (Institute of Chartered Secretaries and Administrators)
Recording equipment like cell phones shouldn’t be prohibited in a security policy, TRUE or FALSE?
FALSE
ensuring that employees understand the implications of installing pirated software would be included in what policy?
Security Policy
What do international export controls ensure a company does?
1) ensure a company follows all laws and regulations regarding the import/export of software
What should a company do to ensure export controls aren’t violated?
Implement controls to ensure employees don’t accidentally violate them.
At what two points should you inform users of the security policy?
1) When they join
2) When they connect to an application/service
How should monitors be placed?
so that visitors or people looking through windows can’t see them. Use privacy screens if necessary
how often should you review and audit network security?
at least once a year
It’s ok to allow several users to share a network account to access a shared mailbox?
No. Assign each of their network accounts with the privileges to access the desired mailbox.
guards should receive periodic training to make sure they can recognize a threat and take appropriate action - TRUE or FALSE?
TRUE
What policy document would you refer an employee to if they inadvertently installed a wireless access point?
The acceptable usage policy
what does a security procedure define?
how to respond to a security event that happens on your network