Fundamental Information Security Chapter 13: Information Systems Security Education and Training

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following circumstances would NOT trigger mandatory security training for a federal agency under Office of Personnel Management (OPM) guidelines? Change of senior leadership Change in security environment Change in security procedures Change in employee responsibilities

Change of senior leadership

Which of the following is NOT an advantage to undertaking self-study of information security topics? Self-motivation Flexible materials Fixed pace Low cost

Fixed pace

A professional certification is typically offered as part of an evening curriculum thatleads to a certificate of completion. True False

False

Which of the following graduate degree programs focuses on managing the process of securing information systems, rather than the technical aspects of information security? MBA MS MSc MScIT

MBA

Many security training courses specifically prepare students for certification exams. True False

True

Master of science (MS) degree programs prepare a student to enter the field of information security and perform the work of securing systems. True False

True

Master's programs are generally broad and don't focus on a particular field of study. True False

True

Most professional certifications require certification holders to pursue additional education each year to keep their certifications current. True False

True

Nearly any college or university can offer an information systems security or cybersecurity-related degree program once it obtains accreditation for the curriculum from that state's board of education. True False

True

What is the highest level of academic degree that may be earned in the field of information security? Bachelor of science (BS) Master of business administration (MBA) Doctor of philosophy (PhD) Master of science (MS)

Doctor of philosophy (PhD)

The Office of Personnel Management (OPM) requires that federal agencies provide the training suggested by the National Institute of Standards and Technology (NIST) guidelines. True False

True

________ refers to a program of study approved by the State Department of Education in the state that a school operates. Continuing education Accredited Continuing professional education (CPE) Certificate of completion

Accredited

Donna is building a security awareness program designed to meet the requirements of the Payment Card Industry Data Security Standard (PCI DSS) 3.2. How often must she conduct training for all current employees? :Monthly Semi-annually Annually Biannually

Annually

Donna is building a security awareness program designed to meet the requirements of the Payment Card Industry Data Security Standard (PCI DSS) 3.2. How often must she conduct training for all current employees? Monthly Semi-annually Annually Biannually

Annually

What level of academic degree requires the shortest period of time to earn and does NOT require any other postsecondary degree as a prerequisite? Bachelor's degree Master's degree Doctoral degree Associate's degree

Associate's degree

Continuing professional education (CPE) credits typically represent ________ minutes of classroom time per CPE unit. 30 50 60 120

50

What type of security communication effort focuses on a common body of knowledge? Emails Acceptable use policy (AUP) Education Professional development

Education

What type of security communication effort focuses on a common body of knowledge? Emails Acceptable use policy (AUP) Education Professional development

Education

Most prospective employers value unaccredited programs as much as accredited programs. True False

False

The four main areas in NIST SP 800-50 are awareness, training, certification, and professional development. True False

False

The skills necessary to manage a technical environment are the same as the skills necessary to perform technical work. True False

False

The standard bachelor's designation is a two-year degree program. True False

False

The standard bachelor's designation is a two-year degree program. True False

False

Helen is an experienced information security professional who earned a four-year degree while a full-time student. She would like to continue her studies on a part-time basis. What is the next logical degree for Helen to earn? Bachelor's degree Master's degree Doctoral degree Associate's degree

Master's degree

What government agency sponsors the National Centers of Academic Excellence (CAE) for the Cyber Operations Program? National Security Agency (NSA) Central Intelligence Agency (CIA) Federal Bureau of Investigation (FBI) National Institute of Standards and Technology (NIST)

National Security Agency (NSA)

Brian is the information security training officer for a health care provider. He wants to develop a training program that complies with the provisions of Health Insurance Portability and Accountability Act (HIPAA). Which of the following topics must be included? Password management Medical records formats Prescribing procedures Patient safety

Password management

Which of the following programs requires passing a standardized examination that is based upon a job-task analysis? Certificate of completion Professional certification Bachelor's degree Doctoral degree

Professional certification

A certificate of completion is a document that is given to a student upon completion of a continuing education program and is signed by the instructor. True False

True

Distance learning is another term for online study. True False

True

Security awareness training should remind employees to ensure confidentiality by not leaving any sensitive information or documents on their desks. True False

True

The National Institute of Standards and Technology (NIST) 800 Series publications cover all NIST-recommended procedures for managing information security. True False

True

The main purpose of security training courses is to rapidly train students in one or more skills, or to cover essential knowledge in one or more specific areas. True False

True

The purpose of continuing education is to provide formal training courses that lead to a certificate or professional certification and NOT a degree. True False

True

A professional certification is typically offered as part of an evening curriculum that leads to a certificate of completion. True False

False

Advantages of self-study programs include self-motivation, low-cost, and interaction with other students or an instructor. True False

False

In general, security training programs are identical to security education programs with respect to their focus on skills and in their duration. True False

False

A security awareness program that focuses on an organization's Bring Your Own Device (BYOD) policy is designed to cover the use of what type of equipment? Servers Workstations Printers Personally owned device

Personally owned devices


Conjuntos de estudio relacionados

Ch. 34 Acute Kidney Injury and Chronic Kidney Disease

View Set

Ch. 64: Assessment of reproductive function

View Set

AP Statistics Semester 2 Quiz/Checkpoint Questions

View Set

Saunders NCLEX Comprehensive Review Study Questions

View Set

Configuring Windows Devices 70-697 (Learn Mode - Written Answers)

View Set