Filters
Question type

Study Flashcards

Describe the position of security manager.

Correct Answer

verifed

verified

A security manager is accountable for th...

View Answer

Briefly describe the classifications of InfoSec positions as defined by Schwartz et al.

Correct Answer

verifed

verified

Definers provide the policies,guidelines...

View Answer

an organization  that developed a series of technical security certifications such as the GIAC


A)  Definers
B)  Builders
C)  security manager
D)  security technician
E)  systems programmer
F)  ethics officer
G)  CISSP
H)  SSCP
I)  SANS
J)  CCE

Correct Answer

verifed

verified

Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program? 


A)  CISO
B)  Security manager 
C)  Security officer
D)  Security technician

Correct Answer

verifed

verified

computer forensics certification from ISFCE


A)  Definers
B)  Builders
C)  security manager
D)  security technician
E)  systems programmer
F)  ethics officer
G)  CISSP
H)  SSCP
I)  SANS
J)  CCE

Correct Answer

verifed

verified

Maintaining a secure environment requires that the information security (InfoSec)department be carefully structured and staffed with appropriately skilled and screened personnel.

Correct Answer

verifed

verified

a member of the general business community having an information security related role


A)  Definers
B)  Builders
C)  security manager
D)  security technician
E)  systems programmer
F)  ethics officer
G)  CISSP
H)  SSCP
I)  SANS
J)  CCE

Correct Answer

verifed

verified

The most common qualification for a CISO includes the CISSP and CISM certifications.

Correct Answer

verifed

verified

True

It is the responsibility of a _______________________ to develop appropriate InfoSec policies,standards,guidelines,and procedures.

Correct Answer

verifed

verified

Which of the following policies requires that two individuals review and approve each other's work before the task is considered complete? 


A)  Task rotation
B)  Two-person control 
C)  Separation of duties
D)  Job rotation

Correct Answer

verifed

verified

Which of the following is NOT a task that must be performed if an employee is terminated? 


A)  Former employee must return all media 
B)  Former employee's home computer must be audited 
C)  Former employee's office computer must be secured 
D)  Former employee should be escorted from the premises

Correct Answer

verifed

verified

InfoSec is a profession with little personnel turnover - most InfoSec professionals stay in their positions for a very long time.

Correct Answer

verifed

verified

False

Temporary hires called contract employees - or simply contractors - should not be allowed to do what? 


A)  Work on the premises
B)  Wander freely in and out of buildings 
C)  Visit the facility without specific, prior coordination
D)  Compensated by the organization based on hourly rates

Correct Answer

verifed

verified

Which of the following is a responsibility of an InfoSec technician? 


A)  Developing InfoSec requirements for the organization 
B)  Providing hands-on technical consulting services to teams of technical specialists 
C)  Establishing procedures for the identification of information assets 
D)  Managing the development of InfoSec policies

Correct Answer

verifed

verified

B

A technically qualified individual who may configure firewalls and IDPSs, implement security software,diagnose and troubleshoot problems,and coordinate with systems and network administrators to ensure that security technical controls are properly implemented is known as a security architect.

Correct Answer

verifed

verified

According to Schwartz et al.,employees who create and install security solutions fall under which classification of InfoSec positions? 


A)  Definers
B)  Administers 
C)  Builders
D)  Architects

Correct Answer

verifed

verified

A security manager is accountable for the day-to-day operation of all or part of the InfoSec program.

Correct Answer

verifed

verified

a member of the IT community often responsible for complex operating system programs


A)  Definers
B)  Builders
C)  security manager
D)  security technician
E)  systems programmer
F)  ethics officer
G)  CISSP
H)  SSCP
I)  SANS
J)  CCE

Correct Answer

verifed

verified

Which of the following is NOT a typical task performed by the security technician? 


A)  Configure firewalls and IDPSs
B)  Decvelop security policy 
C)  Coordinate with systems and network administrators
D)  Implement advanced security appliances

Correct Answer

verifed

verified

create and install security solutions


A)  Definers
B)  Builders
C)  security manager
D)  security technician
E)  systems programmer
F)  ethics officer
G)  CISSP
H)  SSCP
I)  SANS
J)  CCE

Correct Answer

verifed

verified

Showing 1 - 20 of 60

Related Exams

Show Answer