Filters
Question type

Sometimes, contracted employees are self-employed or are employees of an organization hired for a specific, one-time purpose. These people are typically referred to as ____________________.

Correct Answer

verifed

verified

_____________________ departures include resignation, retirement, promotion, or relocation.

Correct Answer

verifed

verified

The information security function cannot be placed within protective services.

A) True
B) False

Correct Answer

verifed

verified

In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.

A) True
B) False

Correct Answer

verifed

verified

Because the goals and objectives of CIOs and CISOs tend to contradict each other, InformationWeek recommends: "The people who do and the people who watch shouldn't report to a ____________________ manager."

Correct Answer

verifed

verified

The process of ensuring that no unnecessary access to data exists and that employees are able to perform only the minimum operations necessary on a set of data is referred to as the principle of ____________________.

Correct Answer

verifed

verified

A mandatory furlough provides the organization with the ability to audit the work of an individual. _________________________

A) True
B) False

Correct Answer

verifed

verified

Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. _________________________

A) True
B) False

Correct Answer

verifed

verified

Many who enter the field of information security are technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.


A) networking experts or systems administrators
B) database administrators
C) programmers
D) All of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________.


A) technician, manager
B) manager, engineer
C) manager, technician
D) technician, executive

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's CBK.


A) ISSEP
B) ISSMP
C) ISSAP
D) CISSP

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The International Society of Forensic Computer Examiners (ISFCE) offers which certifications?


A) Certified Computer Examiner (CCE)
B) Master Certified Computer Examiner (MCCE)
C) both a & b
D) neither a nor b

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The CISA credential is touted by ISACA as the certification that is appropriate for all but which type of professionals?


A) accounting
B) security
C) networking
D) auditing

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Many hiring managers in information security prefer to recruit a security professional who already has proven HR skills and professional experience, since qualified candidates with information security experience are scarce. _________________________

A) True
B) False

Correct Answer

verifed

verified

Many who move to business-oriented information security were formerly__________ who were often involved in national security or cybersecurity .


A) marketing managers
B) military personnel
C) business analysts
D) lawyers

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Describe the concept of separation of duties.

Correct Answer

verifed

verified

Among several internal control strategie...

View Answer

It is important to gather employee ____________________ early about the information security program and respond to it quickly.

Correct Answer

verifed

verified

What tasks must be performed when an employee prepares to leave an organization?

Correct Answer

verifed

verified

When an employee prepares to leave an or...

View Answer

Security ____________________ are accountable for the day-to-day operation of the information security program.

Correct Answer

verifed

verified

__________ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization's security technology is properly implemented.


A) CSOs
B) CISOs
C) Security managers
D) Security technicians

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 78

Related Exams

Show Answer