Search Header Logo
Tutorial 5 : Security Controls and Policies (Lecture 5)

Tutorial 5 : Security Controls and Policies (Lecture 5)

Assessment

Presentation

Computers

University

Practice Problem

Easy

Created by

Anonymous Anonymous

Used 3+ times

FREE Resource

3 Slides • 10 Questions

1

Multiple Choice

What is the primary purpose of an Security Policy?

1

To provide a marketing advantage

2

To outline the procedures for using company software

3

To define the company's organizational structure

4

To guide user in how to implement and manage security, including

security technology.

2

Multiple Choice

Which of the following best describes a security policy?

1

Policy to ensure that users have access to the appropriate technology and resources

2

A security policy is a document that defines how an organization will deal with some

aspect of security.

3

Policy that defines the company’s hiring and firing procedures

4

Policy that governs how employees can use company vehicles

3

Multiple Choice

What aspect of network security is least likely to be fully addressed by technology alone?

1

Detection of malware and viruses

2

Prevention of brute force attacks

3

Mitigating the risk of physical intrusion

4

Addressing human error and social engineering attacks

4

Multiple Choice

What is the primary purpose of identifying and classifying information and assets in an organization's security strategy?

1

To ensure all employees are aware of the organization's wealth

2

To create a public record of the company's assets for marketing purposes

3

To determine the appropriate level of security controls and measures for different types of data and assets

4

To streamline the process of employee onboarding

5

Multiple Choice

What is a key function of an effective security policy in relation to organizational assets?

1

To provide a comprehensive list of all employees and their roles

2

To identify assets that require protection and determine the level of security necessary for each

3

To ensure all software used in the organization is up-to-date

4

To outline the social media usage policy for employees

6

Multiple Choice

Why are policies considered an important element of access control in an organization?

1

Because they are legally binding contracts with external vendors

2

Because they dictate the entertainment and leisure activities of employees

3

Because they solely focus on the technical aspects of network security

4

Because they help personnel understand the security requirements and provide a broad overview of the organization's security needs, as approved by senior leadership

7

Multiple Choice

Why is data classification critical in an organization's security strategy?

1

It identifies the entertainment value of data for employee engagement.

2

It determines the financial cost of each data item for accounting purposes.

3

It identifies the value of the data to the organization, helping to protect its confidentiality and integrity.

4

It categorizes data based on the software used to create it.

8

Multiple Choice

What is the primary purpose of defining data classifications in an organization?

1

To determine the appropriate storage size for different types of data

2

To categorize data based on its level of sensitivity and the necessary protections

3

To track the frequency of data usage by different departments

4

To decide which data should be made public and which should remain private

9

Multiple Choice

What is the significance of using labels such as confidential, private, sensitive, and public in data classification within organizations?

1

To differentiate between data that can be shared on social media and data that cannot

2

To identify the geographic location where the data is stored

3

To categorize data based on its content, purpose, and the level of restriction required for its access and distribution

4

To classify data based on the department that generated it

10

Multiple Choice

What does the term "Data at Rest" primarily refer to in the context of data security?

1

Data that is actively being processed by a computer system

2

Data that is in transit over a network

3

Data that is stored on a physical or digital storage medium and is not actively being used or moved

4

Data that is temporarily held in a computer's RAM

11

  1. Discuss security measure that are important to protect "Data at Rest." Explain why these measures are necessary.

12

  1. Describe a scenario where advanced technological security measures (e.g., firewalls, encryption) could fail if not complemented by proper user training and awareness. Explain the importance of this complementary relationship.

13

  1. Explain what is meant by advisory security policies. How do these differ from mandatory security policies in terms of content, purpose, and impact on employee behavior?

What is the primary purpose of an Security Policy?

1

To provide a marketing advantage

2

To outline the procedures for using company software

3

To define the company's organizational structure

4

To guide user in how to implement and manage security, including

security technology.

Show answer

Auto Play

Slide 1 / 13

MULTIPLE CHOICE