Filters
Question type

Study Flashcards

The position of security technician can be offered as an entry-level position.

A) True
B) False

Correct Answer

verifed

verified

Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________.


A)  technician, manager
B)  manager, engineer 
C)  manager, technician
D)  technician, executive

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A mandatory furlough provides the organization with the ability to audit the work of an individual. _________________________

A) True
B) False

Correct Answer

verifed

verified

Security managers accomplish objectives identified by the CISO and resolve issues identified by technicians. _________________________

A) True
B) False

Correct Answer

verifed

verified

The __________ is typically considered the top information security officer in the organization.


A)  CISO
B)  CFO 
C)  CTO
D)  CEO

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A

Many who enter the field of information security are technical professionals such as __________ who find themselves working on information security applications and processes more often than traditional IT assignments.


A)  networking experts or systems administrators
B)  database administrators 
C)  programmers
D)  All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

D

The International Society of Forensic Computer Examiners (ISFCE) offers which certifications  


A)  Certified Computer Examiner (CCE)
B)  Master Certified Computer Examiner (MCCE)  
C)  both a & b
D)  neither a nor b

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. _________________________

A) True
B) False

Correct Answer

verifed

verified

Job ____________________ can greatly increase the chance that an employee's misuse of the system or abuse of information will be detected by another employee.

Correct Answer

verifed

verified

The CISA credential is touted by ISACA as the certification that is appropriate for all but which type of professionals  


A)  accounting
B)  security 
C)  networking
D)  auditing

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

The process of ensuring that no unnecessary access to data exists and that employees are able to perform only the minimum operations necessary on a set of data is referred to as the principle of ____________________.

Correct Answer

verifed

verified

least privilege

Security ____________________ are accountable for the day-to-day operation of the information security program.

Correct Answer

verifed

verified

The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's CBK.


A)  ISSEP
B)  ISSMP 
C)  ISSAP
D)  CISSP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ agency provides specifically qualified individuals at the paid request of another company.

Correct Answer

verifed

verified

The process of integrating information security perspectives into the hiring process begins with reviewing and updating all job descriptions.

A) True
B) False

Correct Answer

verifed

verified

The SSCP examination is much more rigorous than the CISSP examination.

A) True
B) False

Correct Answer

verifed

verified

CompTIA offers a vendor-specific certification program called the Security+ certification.

A) True
B) False

Correct Answer

verifed

verified

In many organizations, information security teams lack established roles and responsibilities.

A) True
B) False

Correct Answer

verifed

verified

Though CISOs are business managers first and technologists second, they must be conversant in all areas of information security, including the technical, planning, and ____________________ areas.

Correct Answer

verifed

verified

Showing 1 - 20 of 77

Related Exams

Show Answer