You are on page 1of 7

1.

The general management community of interest must work with the information security professionals to integrate solid information security concepts into the personnel management practices of the organization. Student Response A. True B. False Score:
2.

Value 100%

Correct Answer

Feedback

1/1

In many organizations, information security teams lacks established roles and responsibilities. Student Response A. True B. False Score:
3.

Value 100%

Correct Answer

Feedback

1/1

In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates. Student Response A. True B. False Score: 1/1 Value 100% Correct Answer Feedback

4.

Information security should be visible to the users. Student Response A. True B. False General Feedback: Score:
5.

Value

Correct Answer

Feedback

100% This question is not a good one! The statement can be interpreted from various perspectives. 1/1

The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions. Student Response A. True B. False Score:
6.

Value 100%

Correct Answer

Feedback

1/1

The organization should integrate the security awareness education into a new hire’s ongoing job orientation and make it a part of every employee’s on-the-job security training. Student Response A. True B. False Score: 1/1 Value 100% Correct Answer Feedback

7.

To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility. Student Response A. True B. False Score:
8.

Value 100%

Correct Answer

Feedback

1/1

Organizations are not required by law to protect employee information that is sensitive or personal. Student Response A. True B. False Score:
9.

Value

Correct Answer

Feedback

100% 1/1

Upper management should learn more about the budgetary needs of the information security function and the positions within it. Student Response A. True B. False Score: 1/1 Value 100% Correct Answer Feedback

10.

Many hiring managers in the information security field prefer to recruit a security professional who has already proven HR skills. Student Response A. True B. False Score:
11.

Value

Correct Answer

Feedback

100% 1/1

Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. Student Response A. True B. False Score: 1/1 100% Value Correct Answer Feedback

12.

The information security function can be placed within the ____. Student Response A. insurance and risk management function B. administrative services function C. legal department D. All of the above Score: 1/1 100% Value Correct Answer Feedback

13.

Many information security professionals enter the field from traditional ____ assignments. Student Response A. HR B. BA C. IT D. All of the above Score:
14.

Value

Correct Answer

Feedback

100%

1/1

____ are the real techies who create and install security solutions. Student Response A. Builders B. Administrators C. Senior managers D. Definers Score:
15.

Value 100%

Correct Answer

Feedback

1/1

____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization’s security technology is properly implemented. Student Response A. CSOs B. CISOs C. Security managers D. Security technicians Score: 1/1 100% Value Correct Answer Feedback

16.

The breadth and depth covered in each of the domains makes the ____ one of the most difficultto-attain certifications on the market. Student Response A. NSA B. CISO C. CISSP D. ISEP Score:
17.

Value

Correct Answer

Feedback

100%

1/1

The applicant for the CISA must provide evidence of ____ years of professional work experience in the field of information security, with a waiver or substitution of up to two years for education or previous certification. Student Response A. five B. eight C. ten D. twelve Score: 1/1 Value 100% Correct Answer Feedback

18.

Many organizations use a(n) ____ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee’s tenure in the organization. Student Response A. hostile B. departure C. exit D. termination Score:
19.

Value

Correct Answer

Feedback

100%

1/1

____ is the requirement that every employee be able to perform the work of another employee. Student Response A. Two-man control B. Collusion C. Duty exchange D. Task rotation Score: 1/1 100% Value Correct Answer Feedback