SECURITY AND PERSONNEL Flashcards
1
Q
- The general management community of interest must work with the information security professionals to integrate solid information security concepts into the personnel management practices of the organization.
A
T
2
Q
- The information security function cannot be placed within protective services.
A
F
3
Q
. In many organizations, information security teams lacks established roles and responsibilities.
A
T
4
Q
In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.
A
T
5
Q
- The use of standard job descriptions can increase the degree of professionalism in the information security field.
A
T
6
Q
- Builders operate and administrate the security tools and the security monitoring function and continuously improve the processes, performing all the day-to-day work.
A
F
7
Q
- Security managers are accountable for the day-to-day operation of the information security program.
A
T
8
Q
- The security manager position is much more general than that of CISO.
A
F
9
Q
- The position of security technician can be offered as an entry-level position.
A
T
10
Q
- All of the existing certifications are fully understood by hiring organizations.
A
F
11
Q
- ISSEP was developed under a joint agreement between the FBI and the United States National Security Agency, Information Assurance Directorate.
A
F
12
Q
- Each CISSP concentration exam consists of 25 to 50 questions.
A
F
13
Q
- The SSCP covers ten domains.
A
F
14
Q
- The SCNA track focuses on firewalls and intrusion detection.
A
F
15
Q
- Information security should be visible to the users.
A
F
16
Q
- The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions.
A
T
17
Q
- The organization should integrate the security awareness education into a new hire’s ongoing job orientation and make it a part of every employee’s on-the-job security training.
A
T
18
Q
- In the business world, background checks determine the individual’s level of security classification, a requirement for many positions.
A
F
19
Q
- To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility.
A
T
20
Q
- Organizations are not required by law to protect employee information that is sensitive or personal.
A
F
21
Q
- The model used often by large organizations places the information security department within the ____ department.
a.
management
c.
financial
b.
information technology
d.
production
A
b.
information technology
22
Q
- The information security function can be placed within the ____.
a.
insurance and risk management function
b.
administrative services function
c.
legal department
d.
All of the above
A
d.
All of the above
23
Q
- ____ are often involved in national security and cyber-security tasks and move from those environments into the more business-oriented world of information security.
a.
Marketing managers
c.
Business analysts
b.
Military personnel
d.
Lawyers
A
b.
Military personnel
24
Q
- Many information security professionals enter the field from traditional ____ assignments.
a.
HR
c.
IT
b.
BA
d.
All of the above
A
c.
IT
25
Q
- A study of information security positions, done by Schwartz, Erwin,Weafer, and Briney, found that positions can be classified into one of ____ areas.
a.
two
c.
four
b.
three
d.
five
A
b.
three
26
Q
- ____ are the real techies who create and install security solutions.
a.
Builders
c.
Senior managers
b.
Administrators
d.
Definers
A
a.
Builders
27
Q
- The ____ position is typically considered the top information security officer in the organization.
a.
CISO
c.
CTO
b.
CFO
d.
CEO
A
a.
CISO
28
Q
- ____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization’s security technology is properly implemented.
a.
CSOs
c.
Security managers
b.
CISOs
d.
Security technicians
A
d.
Security technicians
29
Q
- The breadth and depth covered in each of the domains makes the ____ one of the most difficult-to-attain certifications on the market.
a.
NSA
c.
CISSP
b.
CISO
d.
ISEP
A
d.
ISEP
30
Q
- In recent years, the ____ certification program has added a set of concentration exams.
a. ISSEP c. ISSAP
b. ISSMP d. CISSP
A
d. CISSP
31
Q
- The ____ examination is designed to provide CISSPs with a mechanism to demonstrate competence in the more in-depth and concentrated requirements of information security manage-ment.
a. ISSMP c. CISSPM
b. ISSAP d. CISSMP
A
a. ISSMP
32
Q
- ____ was designed to recognize mastery of an international standard for information secu-rity and a common body of knowledge (sometimes called the CBK).
a. CISSP c. SSCP
b. ISSMP d. All of the above
A
c. SSCP
33
Q
- The SSCP exam consists of ____ multiple-choice questions, and must be completed within three hours.
a. 75 c. 125
b. 100 d. 225
A
c. 125
34
Q
- System Administration, Networking, and Security Organization is better known as ____.
a. SANO c. SANS
b. SAN d. SANSO
A
c. SANS
35
Q
- The applicant for the CISM must provide evidence of ____ years of professional work ex-perience in the field of information security, with a waiver or substitution of up to two years for education or previous certification.
a. five c. ten
b. eight d. twelve
A
a. five
36
Q
- The ____ program focuses more on building trusted networks, including biometrics and PKI.
a. NFC c. PKI
b. SCNP d. SCNA
A
d. SCNA
37
Q
- Many organizations use a(n) ____ interview to remind the employee of contractual obliga-tions, such as nondisclosure agreements, and to obtain feedback on the employee’s tenure in the organization.
a. hostile c. exit
b. departure d. termination
A
c. exit
38
Q
- ____ are hired by the organization to serve in a temporary position or to supplement the ex-isting workforce.
a. Temporary em-ployees c. Contractors
b. Consultants d. Self-employees
A
a. Temporary em-ployees
39
Q
- ____ is a cornerstone in the protection of information assets and in the prevention of finan-cial loss.
a. Fire protection c. Separation of duties
b. Business separation d. Collusion
A
c. Separation of duties
40
Q
- ____ is the requirement that every employee be able to perform the work of another em-ployee.
a. Two-man control c. Duty exchange
b. Collusion d. Task rotation
A
d. Task rotation