89%(84)75 out of 84 people found this document helpful
This preview shows page 3 - 5 out of 8 pages.
4 pointsQuestion 71.Policies and standards are a collection of concrete definitions that describe acceptable andunacceptable human behavior. The questions related to_______________ are more appropriatefor procedures or guidelines than policies or standards, which require detail that is more at thelevel of________________.A.where, when and how; what and whyB.how; whatC.where and when; what, who and whyD.where, when, and how; what, who, and why4 pointsQuestion 81.Which of the following user types is responsible foraudit coordination and response, physicalsecurity and building operations, and disaster recovery and contingency planning?4 pointsQuestion 91._______________ are owned by an organization if they are created on the computer by companyemployees or if the assets were custom developed for and purchased by the organization.
4 pointsQuestion 101.In a (n) ____________________, there are policies, standards, baselines, procedures, guidelines,and taxonomy.4 pointsQuestion 111.Authentication is one of the most important components of the user domain, and it is necessaryto determine an authentication method that makes sense for your organization. It is best torestrict access to an ID and password to one individual and ensure that users frequently changepasswords.TrueFalse4 pointsQuestion 121.Of the eight classic personality types in the workplace,commanders,can often appear angry oreven hostile toward ideas and others on the team and are critical ofothers’ideas.4 points
You've reached the end of your free preview.
Want to read all 8 pages?
ChiefInformation Security Officer, Institute of Standards and Technology, Control Association
, Isol 631 Residency