Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Computer Security Fundamentals

Computing

Quiz 10 :

Security Policies

Quiz 10 :

Security Policies

search
arrow
Security policies toward programmers and web developers are developmental policies.
Free
True False
Answer:

Answer:

True

arrow
A security policy is a document that defines how an organization deals with some aspect of security.
Free
True False
Answer:

Answer:

True

arrow
Principal of least privilege means that no one person can perform critical tasks.
Free
True False
Answer:

Answer:

False

arrow
Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______
Multiple Choice
Answer:
arrow
New employees should receive a copy of the company's __________ policies.
Multiple Choice
Answer:
arrow
You cannot disable some USB devices from end-user computers and allow others.
True False
Answer:
arrow
Passwords are an area of user policies.
True False
Answer:
arrow
On an employee's last day of work,his workstation hard drive should be searched.
True False
Answer:
arrow
One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.
True False
Answer:
arrow
Procedures for adding users,removing users,and dealing with security issues are examples of ___________ policies.
Multiple Choice
Answer:
arrow
An organization should not permit end users to install anything on their computer.
True False
Answer:
arrow
The plan to return a business to full normal operations is ____________
Multiple Choice
Answer:
arrow
__________ is the most obvious reason for organizations to provide their users with Internet access.
Multiple Choice
Answer:
arrow
Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?
Multiple Choice
Answer:
arrow
Which of the following should NOT be a part of an organization's policy regarding email attachments?
Multiple Choice
Answer:
arrow
A document that defines how an organization deals with some aspect of security is a(n)__________.
Multiple Choice
Answer:
arrow
The background,screensaver,font size,and resolution are elements of _______.
Multiple Choice
Answer:
arrow
Standards are specific instructions on how to handle a specific issue.
True False
Answer:
arrow
A good password should have at least eight characters and use all lowercase letters.
True False
Answer:
arrow
Passwords,Internet use,email attachments,software installation,instant messaging,and desktop configuration are areas of ______.
Multiple Choice
Answer:
Showing 1 - 20 of 25