CST339 - Ch 09

CST339 - Ch 09

University

12 Qs

quiz-placeholder

Similar activities

CNET251 - Ch 6 -Risk Management- Assessing Risk

CNET251 - Ch 6 -Risk Management- Assessing Risk

University

10 Qs

Microsoft Excel Revision

Microsoft Excel Revision

University

10 Qs

Linked List

Linked List

University

14 Qs

Email Basics

Email Basics

10th Grade - Professional Development

10 Qs

Operations Security (OpSec)

Operations Security (OpSec)

University

10 Qs

Computer Graphics

Computer Graphics

University

10 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Cryptography

Cryptography

University

15 Qs

CST339 - Ch 09

CST339 - Ch 09

Assessment

Quiz

Computers

University

Hard

Created by

Shankar Karuppayah undefined

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common hiring issues according to security employment practices?

Detailed job descriptions that include information that describes access privileges grant to the (successful) applicant

Avoiding secure and restricted sites during interview sessions that includes a tour

Background check conducted after extending an offer to a candidate

Not requiring any periodic security awareness training

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Termination issues: Which of the following does not need to be performed?

Employee return all removable media

Keycard access be revoked

Business cards returned

Personal effects be removed from the premise

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which factors influence on the treatment of a departure as friendly or hostile?

Nature of new company they joining

Nature job of last job/role in the current company

Relationship with the HR/Management

Random

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why do we need a two-man rule?

To prevent accidental/intentional leaks of information

To ensure more jobs for the citizens

Double up staff count for a department/task

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

From a security standpoint , access to information

for these individuals should be limited to what is

necessary to perform their duties

HR Officers

Temporary Workers

Top Management

CEO

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Costs

and benefits and performance of InfoSec are

impossible to measure!

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the THREE common types of InfoSec performance management measurements?

Those that determine the effectiveness of the execution of InfoSec policy

Those that determine the effectiveness of the design of InfoSec policy

Those that determine the effectiveness of the delivery of InfoSec services

Those that assess the impact of an incident

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?