2.9
Which of the following BEST describes a Security Policy? A document that defines how often backups should run and where they should be saved. A document that outlines how long a password should be and which characters can be used in the password. A document or collection of documents that provide information about an organization's network security. A document that outlines who has access to company resources.
A document or collection of documents that provide information about an organization's network security.
Which of the following documents might a new employee need to sign during the onboarding process? (Select two.) . Regulatory and Compliance Policy . Bring Your Own Device (BYOD) Policy . Backup Policy . User Education and Awareness Policy . Acceptable Use Policy (AUP)
Bring Your Own Device (BYOD) Policy Acceptable Use Policy (AUP)
Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.) . Disable electronic access for the employee. . Have the employee sign a Non-Disclosure Agreement. . Collect physical access items from the employee. . Review the Acceptable Use Policy (AUP) with the employee. . Make sure the employee has access to the company's knowledge base.
Disable electronic access for the employee. Collect physical access items from the employee.
You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.) Respond to social engineering attacks. Bring your own devices to work. Click on links in a phishing email. Access restricted areas in the company building. Become familiar with the company Security Policy. Install software on their company laptops. Connect unauthorized devices.
Respond to social engineering attacks. Click on links in a phishing email. Connect unauthorized devices.
Jared, an employee in Human Resources, left the company two months ago as part of a company downsizing initiative. A new Human Resources VP is now running the department and has re-hired Jared to work as a manager in Human Resources. As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared. What should have been done during Jared's offboarding process to make sure his accounts were still available for a period of time? . The accounts should have been deleted, but not removed from the trash. . The accounts should have been left in place for a required period of time. . The account passwords should have been changed. . The accounts should have been disabled instead of deleted.
The accounts should have been disabled instead of deleted.
You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? (Select three.) The help desk's contact information The process for reporting suspicious behavior The Data Backup Policy The Security Policy The procedure for closing user accounts The network diagram The User Education and Awareness Policy
The help desk's contact information The process for reporting suspicious behavior The Security Policy
Which of the following are included in a network topology diagram? (Select two.) A layout of server racks, cooling, and air circulation systems. The location and IP addresses of hubs, switches, routers, and firewalls. A layout of all plumbing and HVAC components. A layout of all electrical wiring and components. The relationship between remote locations and the WAN links that connect them.
The location and IP addresses of hubs, switches, routers, and firewalls. The relationship between remote locations and the WAN links that connect them.
Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? Security Policy Acceptable Use Policy (AUP) User Education and Awareness Policy Bring Your Own Device (BYOD) Policy
User Education and Awareness Policy
Your organization has expanded into an adjacent office. You have been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure? . Network topology diagram . Knowledge base . Floor plan . Physical security diagram
floor plan
You are currently working with the company's IT system administrator to make sure that all policies and procedures meet city, state, and industry regulations. You have noted that employees often allow coworkers into restricted areas who may not have authorized access. In addition, employees often work from home using company laptops that are often unsecure and frequently contain sensitive company data on the local hard drive. SOLUTION: You update the Acceptable Use Policy (AUP) to clearly state that only authorized employees can access restricted areas with a proper key fob (no tailgating), along with any penalties for non-compliance. To address the laptop security issue, you work with the IT system administrator to update the network diagram and inform employees of the changes to help secure their laptops. Does this solution provide a reasonable approach for addressing the security area and work-from-home issues?
no