Search Header Logo

CST339 - Ch 09

Authored by Shankar Karuppayah undefined

Computers

University

Used 2+ times

CST339 - Ch 09
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common hiring issues according to security employment practices?

Detailed job descriptions that include information that describes access privileges grant to the (successful) applicant

Avoiding secure and restricted sites during interview sessions that includes a tour

Background check conducted after extending an offer to a candidate

Not requiring any periodic security awareness training

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Termination issues: Which of the following does not need to be performed?

Employee return all removable media

Keycard access be revoked

Business cards returned

Personal effects be removed from the premise

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which factors influence on the treatment of a departure as friendly or hostile?

Nature of new company they joining

Nature job of last job/role in the current company

Relationship with the HR/Management

Random

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why do we need a two-man rule?

To prevent accidental/intentional leaks of information

To ensure more jobs for the citizens

Double up staff count for a department/task

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

From a security standpoint , access to information

for these individuals should be limited to what is

necessary to perform their duties

HR Officers

Temporary Workers

Top Management

CEO

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Costs

and benefits and performance of InfoSec are

impossible to measure!

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the THREE common types of InfoSec performance management measurements?

Those that determine the effectiveness of the execution of InfoSec policy

Those that determine the effectiveness of the design of InfoSec policy

Those that determine the effectiveness of the delivery of InfoSec services

Those that assess the impact of an incident

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?