2.9.5 - Practice Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your organization has expanded into an adjacent office. You have been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure?

Floor plan

Which of the following are included in a network topology diagram? (Select two.)

- The location and IP addresses of hubs, switches, routers, and firewalls. - The relationship between remote locations and the WAN links that connect them.

Which of the following documents might a new employee need to sign during the onboarding process? (Select two.)

- Acceptable Use Policy (AUP) - Bring Your Own Device (BYOD) Policy

Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.)

- Collect physical access items from the employee. - Disable electronic access for the employee.

You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.)

- Connect unauthorized devices. - Respond to social engineering attacks. - Click on links in a phishing email.

You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? (Select three.)

- The Security Policy - The help desk's contact information - The process for reporting suspicious behavior

Which of the following BEST describes a Security Policy?

A document or collection of documents that provide information about an organization's network security.

You are an information security specialist in charge of developing and implementing security measures for your company. You are currently working with the company's IT system administrator to make sure that all policies and procedures meet city, state, and industry regulations. You have noted that employees often allow coworkers into restricted areas who may not have authorized access. In addition, employees often work from home using company laptops that are often unsecure and frequently contain sensitive company data on the local hard drive. SOLUTION: You update the Acceptable Use Policy (AUP) to clearly state that only authorized employees can access restricted areas with a proper key fob (no tailgating), along with any penalties for non-compliance. To address the laptop security issue, you work with the IT system administrator to update the network diagram and inform employees of the changes to help secure their laptops. Does this solution provide a reasonable approach for addressing the security area and work-from-home issues?

No

Jared, an employee in Human Resources, left the company two months ago as part of a company downsizing initiative. A new Human Resources VP is now running the department and has re-hired Jared to work as a manager in Human Resources. As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared. What should have been done during Jared's offboarding process to make sure his accounts were still available for a period of time?

The accounts should have been disabled instead of deleted.

Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively?

User Education and Awareness Policy


Conjuntos de estudio relacionados

Chapter 24. Water and Electrolytes

View Set

Chapter 33: Caring for Children in Diverse Settings

View Set

dmv written test (california 2017)

View Set

Chapter 3 - Open Responses + True/False

View Set