Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management of Information Security
Quiz 11: Personnel and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Credit reports contain information on a job candidate's medical history,credit history,and other personal data.
Question 22
True/False
It is easy to limit a temporary employee's access to only the information required for his or her assigned duties.
Question 23
True/False
The CISSP has recently had three concentrations added: the Information Systems Security Architecture Professional (ISSAP),the Information Systems Security Engineering Professional (ISSEP)and the
Information Systems Security Management Professional (ISSMP)
._________________________
Question 24
True/False
In addition to the responsibility of conducting investigations of information security violations,a(n)
CISO
has to work effectively with external law enforcement to resolve these situations._________________________
Question 25
True/False
Security is generally a people problem and not a technological one.
Question 26
True/False
In the classification of information security positions,the real technical types who create and install security solutions fall under the category of those that
define
._________________________
Question 27
True/False
When two business partners integrate their information systems,the level of security of both systems must be examined before any physical integration takes place,as system connection means that vulnerability on one system becomes vulnerability for all linked systems.
Question 28
True/False
Before extending an offer of employment,it is necessary to conduct a background check on any potential candidate,regardless of job level.
Question 29
True/False
The International Information Systems Security Certification Consortium's most popular certification program is the
CISM
.__________________________________________________
Question 30
True/False
Social engineering uses persuasive techniques to gain an individual's confidence in an effort to obtain information.
Question 31
True/False
Typical temporary workers include groundskeepers,maintenance,services staff,electricians,mechanics,attorneys,technical consultants,and IT specialists.
Question 32
True/False
The
general
management community of interest should learn more about the requirements and qualifications for information security positions in order to move the information security discipline forward._________________________