Chapter 10

Ace your homework & exams now with Quizwiz!

Which of the following is the appropriate sequence of events for a new employee? a.) IT is notified of the new employee and the requested resources > employee is granted access to those resources > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules b.) IT is notified of the new employee and the requested rights > employee is given access to those resources > employee signs acknowledging a receipt of a copy of security rules c.) IT is notified of the new employee and assigns default rights > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules d.) IT is notified of the new employee and assigns default rights > employee signs acknowledging receipt of company security rules

a.) IT is notified of the new employee and the requested resources > employee is granted access to those resources > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules

Which of the following is the appropriate sequence for a change request? a.) business unit manager requests change > IT unit verifies request > request is implemented b.) business unit manager requests change > IT unit verifies request > security unit verifies request > request is scheduled with rollback plan > request is implemented c.) business unit manager requests change > IT unit verifies request > request is scheduled with rollback plan > request is implemented d.) business unit manager requests change > IT unit verifies request > security unit verifies request > request is implemented

a.) business unit manager requests change > IT unit verifies request > request is implemented

Which of the following is not a significant security risk posed by instant messaging? a.) employees may send harassing messages b.) employees might send out confidential information c.) a virus or worm might infect the workstation via instant messaging d.) an instant messaging program could actually be a Trojan horse

a.) employees may send harassing messages

Which of the following should not be recommended as acceptable email attachments? a.) flash animations b.) excel spreadsheets from a colleague c.) attachments you were expecting d.) plain text attachments from known sources

a.) flash animations

Which of the following is not an area that user policies need to cover? a.) minimum length of passwords b.) what websites one can or cannot visit c.) if and when to share passwords d.) what to do if you believe your passwords has been compromised

a.) minimum length of passwords

Which of the following is the appropriate sequence of events for a departing employee? a.) IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled b.) IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled > the employee's workstation is searched/scanned c.) IT is notified of the departure > all physical access is shut down > all electronic access is shut down d.) IT is notified of the departure > all electronic access is shut down > all physical access is shut down

b.) IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled > the employee's workstation is searched/scanned

Which of the following is a list of items that should be implemented in all secure code? a.) all code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication activity thoroughly documented b.) all code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines, all communication activity thoroughly documented c.) all code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines d.) all code checked for backdoors or Trojans, all communication adheres to organizational guidelines, all communication activity thoroughly documented

b.) all code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines, all communication activity thoroughly documented

After dealing, on a technical level, with any security breach, what is the last thing to be done for a security breach? a.) quarantine infected machines b.) study the breach to learn how to prevent a recurrence c.) notify management d.) log the incident

b.) study the breach to learn how to prevent a recurrence

What is the rule in access control? a.) the most access you can securely give b.) the least access job requirements allow c.) standard access for all users d.) strictly limited access for most users

b.) the least access job requirements allow

What must all user policies have in order to be effective? a.) they must be reviewed by an attorney b.) they must have consequences c.) they must be notarized d.) they must be properly filed and maintained

b.) they must have consequences

Which of the following does not demonstrate the need for policies? a.) antivirus software cannot prevent a user from downloading infected files b.) the most secure password is not at all secure if it's posted on a note by the computer c.) end users are generally not particularly bright and must be told everything d.) technological security measures are dependent upon the employees' implementation

c.) end users are generally not particularly bright and must be told everything

What should an employee do if she believes her password has been revealed to another party? a.) if it us a trusted employee or friend, just ignore it b.) change your own password immediately c.) notify the IT department d.) ignore it

c.) notify the IT department

Which of the following is not an example of a user password policy? a.) users may not keep copies of passwords in their office b.) passwords must be eight characters long c.) users may only share passwords with their assistants d.) passwords may not be shared with any employee

c.) users may only share passwords with their assistants

Which of the following is the best reason users should be prohibited from installing software? a.) they may not install it correctly, which could cause security problems for the workstation b.) they may install software that circumvents security c.) software installation is often complex and should be done by professionals d.) if a user's account does not have privileges to install, then it is likely that a Trojan horse will not be inadvertently installed under their account

d.) if a user's account does not have privileges to install, then it is likely that a Trojan horse will not be inadvertently installed under their account

What is the first step when discovering a machine(s) has been infected with a virus? a.) log the incident b.) scan and clean infected machine(s) c.) notify appropriate management d.) quarantine infected machine(s)

d.) quarantine infected machine(s)


Related study sets

FNAN307 Exam 2 (Luquette) Connect

View Set

Essential Cell Biology (4th Edition) Chapter 20 Part I Cell Communities: Cancer

View Set

Week 7 quiz Principles of nursing

View Set

PSYC CH 6 QUIZ: Somatic and Dissociative Disorders

View Set

Economic Change and Political Consolidation (w/ multiple choice)

View Set

Chapter 10 - Communicating Effectively

View Set