Search Header Logo

CNET251 Chapt 9 - Security Management Practices

Authored by Karen Diggs

Computers

University

Used 28+ times

CNET251 Chapt 9 - Security Management Practices
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Organizations that provide complete job descriptions when advertising open positions should include the elements of the job description that describe access privileges.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security (background) check might be required by someone applying for jobs in law enforcement or high-security positions?

identity checks

credit history

polygraph test

reference check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which personnel security practice is used to ensure that no one employee is performing actions that cannot be knowledgeably reviewed by another employee?

mandatory vacation policy

two-person control

separation of duties

task rotation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All but which of the following is one of the four factors critical to success of an InfoSec program, as listed by SP 800-55 Rev. 1?

Actions-oriented measurement analysis

Strong upper-level management support

Practical InfoSec policies and procedures

Quantifiable performance measurements

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of the performance measurement development process identifies relevant stakeholders and their interests in InfoSec measurement?

Phase 1

Phase 2

Phase 4

Phase 7

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Measurements that examine the performance of an individual control or group of controls within the InfoSec program are known as which of the following?

micro-focus measurements

baseline measurements

macro-focus measurements

benchmark measurements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Performance targets are often a hindrance to effective security.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?