Filters
Question type

The general management community of interest must work with information security professionals to integrate solid information security concepts into the personnel management practices of the organization.

A) True
B) False

Correct Answer

verifed

verified

Related to the concept of separation of duties is that of ____________________, the requirement that two individuals review and approve each other's work before the task is categorized as finished.

Correct Answer

verifed

verified

two-person...

View Answer

To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility.

A) True
B) False

Correct Answer

verifed

verified

Job ____________________ can greatly increase the chance that an employee's misuse of the system or abuse of information will be detected by another employee.

Correct Answer

verifed

verified

The breadth and depth covered in each of the domains makes the __________ one of the most difficult-to-attain certifications on the market.


A) NSA
B) CISO
C) CISSP
D) ISEP

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

To assess the effect that changes will have on the organization's personnel management practices, the organization should conduct a ____________________feasibility study before the program is implemented.

Correct Answer

verifed

verified

In many organizations, information security teams lack established roles and responsibilities.

A) True
B) False

Correct Answer

verifed

verified

__________ is the requirement that every employee be able to perform the work of another employee.


A) Two-man control
B) Collusion
C) Duty exchange
D) Task rotation

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The information security function can be placed within the __________.


A) insurance and risk management function
B) administrative services function
C) legal department
D) All of the above

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

__________ is a cornerstone in the protection of information assets and in the prevention of financial loss.


A) Fire suppression
B) Business separation
C) Separation of duties
D) Collusion

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

"Administrators" provide the policies, guidelines, and standards in the Schwartz, Erwin, Weafer, and Briney classification. _________________________

A) True
B) False

Correct Answer

verifed

verified

The model commonly used by large organizations places the information security department within the __________ department.


A) management
B) information technology
C) financial
D) production

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

The most common credential for a CISO-level position is the Security+ certification. _________________________

A) True
B) False

Correct Answer

verifed

verified

Though CISOs are business managers first and technologists second, they must be conversant in all areas of information security, including the technical, planning, and ____________________ areas.

Correct Answer

verifed

verified

Certifications are designed to recognize ____________________ in their respective fields.

Correct Answer

verifed

verified

The SSCP examination is much more rigorous than the CISSP examination.

A) True
B) False

Correct Answer

verifed

verified

The ____________________ of (ISC)2 program is geared toward those who want to take the CISSP or SSCP exam before obtaining the requisite experience for certification.

Correct Answer

verifed

verified

ISSMP stands for Information Systems Security Monitoring Professional. _________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 78 of 78

Related Exams

Show Answer