cybersecurity 10

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

A security policy is a document that defines how an organization deals with some aspect of security.

true

2
New cards

Passwords are an area of user policies.

true

3
New cards

A good password should have at least eight characters and use all lowercase letters.

false

4
New cards

An organization should not permit end users to install anything on their computer.

true

5
New cards

After an employee discontinues employment, his or her workstation hard drive should be searched.

true

6
New cards

Principal of least privilege means that no one person can perform critical tasks.

false

7
New cards

One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.

true

8
New cards

You cannot disable some USB devices from end-user computers and allow others

false

9
New cards

Standards are specific instructions on how to handle a specific issue.

false

10
New cards

Security policies toward programmers and web developers are developmental policies.

true

11
New cards

A document that defines how an organization deals with some aspect of security is a(n) __________.

Security policy

12
New cards

Password guidelines, Internet use, how to handle email attachments, and software installation processes are areas of ______.

User policies

13
New cards

The plan to return a business to full normal operations is ____________

DRP

14
New cards

__________ is the most obvious reason for organizations to provide their users with Internet access.

Email

15
New cards

Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?

Online shopping during a break time

16
New cards

Which of the following should NOT be a part of an organization’s policy regarding email attachments?

None of the above

17
New cards

Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

Instant messaging

18
New cards

The background, screensaver, font size, and resolution are elements of _______.

Desktop configuration

19
New cards

Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies.

System administration

20
New cards

New employees should receive a copy of the company’s __________ policies.

Security/acceptable use

21
New cards

When an employee leaves, all _______ should be terminated.

Logins

22
New cards

If you determine a virus has struck a system, the first step is to _________.

Unplug the machines from the network

23
New cards

If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated.

IP address

24
New cards

The conflict between the users’ goal for unfettered access to data and the security administrator’s goal to protect that data is an issue of ______________.

Access control

25
New cards

The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.

Implicit deny