This quiz tests knowledge on social engineering and information security, focusing on trust approaches, system personnel attitudes, policy characteristics, risk management, and security policy requirements. It's designed to enhance understanding and application of security principles in professional settings.
They want to be able to get their work done without restrictive security controls.
They are concerned about the ease of managing systems under tight security controls.
They are concerned about cost of security protection for attacks that may not materialize.
They want to manage how users react to security policies.
Rate this question:
Standard
Code
Policy
Guideline
Rate this question:
Policies may be helpful in the event that it is necessary to prosecute violators.
Policies identify what tools and procedures are needed.
Policies define what appropriate behavior for users is.
Policies communicate a unanimous agreement of judgment.
Rate this question:
Threat identification
Threat appraisal
Risk mitigation
Asset identification
Rate this question:
State reasons why the policy is necessary
Be able to implement and enforce it
Be concise and easy to understand
Balance protection with productivity
Rate this question:
Member of management who can enforce the policy
Member of the legal staff
Representative from an antivirus vendor
Senior level administrator
Rate this question:
Due obligations
Due process
Due diligence
Due care
Rate this question:
Notify users in advance that a new security policy is being developed and explain why the policy is needed
Provide a sample of people affected by the policy with an opportunity to review and comment
Prior to deployment, give all users at least two weeks to review and comment
Require all users to approve the policy before it is implemented
Rate this question:
Internet use policy
User permission policy
End user policy
Acceptable use policy
Rate this question:
Do not use a password that is a word found in a dictionary
Do not use the name of a pet
Do not use alphabetic characters
Do not use birthdays
Rate this question:
Outlines how the organization uses information it collects
Is required on all Internet Web sites
Must be certified before it can be used
Is identical to an AUP
Rate this question:
The information itself remains on the hard drive until it is overwritten by new files
The last character of the file name is changed
The file contents are physically overwritten with zeros
It is physically removed from the disk once the Recycle Bin is emptied
Rate this question:
Scope of the work to be performed
Exclusions and exceptions
Requirements for PII
Penalties for failure to fulfill obligations
Rate this question:
Types of policies
User password violations
Free hard drive
Information assets
Rate this question:
Ethics
Morals
Values
Principles
Rate this question:
Institutional
Auditory
Pedagogical
Andragogical
Rate this question:
Relies on tricking and deceiving someone to provide secure information
Is illegal in the U.S.
Requires a computer and Internet connection
Is rarely used today
Rate this question:
Spear phishing
Phishing
Pharming
Yahoo phishing
Rate this question:
Shoulder surfing
Keyboard observation (KO)
Keypad eavesdropping
Finger scanning
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.