Policies and Procedures Flashcards

1
Q

what documented procedures determines the appropriate course of action if there is a security breach?

A

Security Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

physical security, document security and network security are all covered in what Policy?

A

The Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What might government agencies that work with confidential information require from you before granting a contract?

A

Your security certified by external auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which organization certifies the functionality of security products?

A

ICSA (Institute of Chartered Secretaries and Administrators)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recording equipment like cell phones shouldn’t be prohibited in a security policy, TRUE or FALSE?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ensuring that employees understand the implications of installing pirated software would be included in what policy?

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do international export controls ensure a company does?

A

1) ensure a company follows all laws and regulations regarding the import/export of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should a company do to ensure export controls aren’t violated?

A

Implement controls to ensure employees don’t accidentally violate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At what two points should you inform users of the security policy?

A

1) When they join

2) When they connect to an application/service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How should monitors be placed?

A

so that visitors or people looking through windows can’t see them. Use privacy screens if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how often should you review and audit network security?

A

at least once a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It’s ok to allow several users to share a network account to access a shared mailbox?

A

No. Assign each of their network accounts with the privileges to access the desired mailbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

guards should receive periodic training to make sure they can recognize a threat and take appropriate action - TRUE or FALSE?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What policy document would you refer an employee to if they inadvertently installed a wireless access point?

A

The acceptable usage policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does a security procedure define?

A

how to respond to a security event that happens on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What to do when someone has locked themselves out of their account.
How to properly install or remove software.
What to do if files on a server suddenly disappear.
actions to take if there is a physical emergency.
What to do when a network computer has a virus are all examples of what?

A

security procedures

17
Q

When security training system admins, what important piece of information should they know?

A

understand the correct ways to escalate

18
Q

What are the 3 countermeasures when it comes to dealing with data remanence (data remanence = residual data)

A

1) clearing
2) purging
3) destruction

19
Q

Special forensic techniques can recover cleared data? TRUE or FALSE

A

TRUE

20
Q

What countermeasure prevents data recovery even with advanced forensic techniques?

A

Purging/Sanitization

21
Q

List 4 types of data destruction techniques

A

1) Overwriting
2) Degaussing
3) Encryption
4) Physical Destruction

22
Q

What should security professionals research for destroying data on solid state drives?

A

Sanitization commands

23
Q

What destruction method could you use for cloud based informatoin?

A

Encryption

24
Q

List 6 types of motion detection

A

1) Infra-red - heat
2) Electromechanical - circuit break
3) Photoelectric
4) Acoustic detection (sensitive, watch for false alarms)
5) Wave motion - generates wave pattern
6) Capacitance - uses magnetic field

25
Q

What can help support a proper asset management plan and simplifies maintaining accurate records?

A

tagging assets

26
Q

What are the most important types of system updates?

A

Anti-malware updates

27
Q

List the 3 advantages of using a cloud based anti-malware service

A

1) they allow access to the latest malware data within minutes of the cloud antivirus learning about it
2) they eliminate the need to continually update your software
3) requires little processing power

28
Q

List 3 disadvantages of cloud based anti-malware

A

1) they can’t run in the background
2) they may only scan core files
3) internet connection dependant

29
Q

What 3 things do definition files/databases list?

A

1) Viruses and Types
2) Virus footprints
3) How to remove them

30
Q

What 3 things does the virus engine do?

A

1) runs virus scans
2) cleans the files
3) notifies people

31
Q

Scanning for viruses without a known definition is known as what?

A

Heuristic scanning

32
Q

What are the 3 key steps in updating anti-virus components?

A

1) upgrade the anti-virus software
2) update the definitions
3) perform scans

33
Q

What 3 scenarios would you perform an On-Demand Scan?

A

1) when you first install the anti-virus
2) when you upgrade the anti-virus software
3) when you suspect a virus outbreak
- NOTE-be sure you have the latest virus definitions before an on-demand scan

34
Q

What type of scan would you perform if a virus had totally taken control of your machine?

A

Emergency Scan

35
Q

What do you need to perform an emergency scan?

A

the anti-virus emergency boot disk

36
Q

What 6 steps should you take to fix an infected computer?

A

1) first scan all potentially affected internal and external disks
2) establish cleaning station and quarantine area
3) stop users using machines in infected area
4) remove external memory devices and scan on cleaning station
5) update virus definitions on computers still operational
6) do full scans on all computers in the office

37
Q

What do the Institute of Chartered Secretaries and Adminstrators do regarding security?

A

They certify the functionality of security products