CNET251 Chapt 9 - Security Management Practices

CNET251 Chapt 9 - Security Management Practices

University

10 Qs

quiz-placeholder

Similar activities

AIJ (Memahami Fairewall)

AIJ (Memahami Fairewall)

University

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Chapter 4: ROM/RAM

Chapter 4: ROM/RAM

9th Grade - Professional Development

15 Qs

Chapter 4 Revision

Chapter 4 Revision

University

10 Qs

CompTIA Core 2  20221023

CompTIA Core 2 20221023

University

10 Qs

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

Openshift x Sonarqube

Openshift x Sonarqube

University - Professional Development

12 Qs

CNET251 Chapt 9 - Security Management Practices

CNET251 Chapt 9 - Security Management Practices

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Karen Diggs

Used 27+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Organizations that provide complete job descriptions when advertising open positions should include the elements of the job description that describe access privileges.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security (background) check might be required by someone applying for jobs in law enforcement or high-security positions?

identity checks

credit history

polygraph test

reference check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which personnel security practice is used to ensure that no one employee is performing actions that cannot be knowledgeably reviewed by another employee?

mandatory vacation policy

two-person control

separation of duties

task rotation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All but which of the following is one of the four factors critical to success of an InfoSec program, as listed by SP 800-55 Rev. 1?

Actions-oriented measurement analysis

Strong upper-level management support

Practical InfoSec policies and procedures

Quantifiable performance measurements

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of the performance measurement development process identifies relevant stakeholders and their interests in InfoSec measurement?

Phase 1

Phase 2

Phase 4

Phase 7

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Measurements that examine the performance of an individual control or group of controls within the InfoSec program are known as which of the following?

micro-focus measurements

baseline measurements

macro-focus measurements

benchmark measurements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Performance targets are often a hindrance to effective security.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?