You're assisting with a policy review to make certain your company has in place all the policies it should. One of your fellow administrators mentions that he has never seen anything detailing information sensitivity and usage. Which policy would cover this topic?
Security policy
Information classification policy
Use policy
Configuration management policy
Which policy identifies the software and hardware components that can be used in an organization?
Backup policy
Configuration management policy
Inventory policy
Use policy
Which of the following involves keeping records about how your network or organization changes over time?
Change documentation
Use policy
Systems architecture
BIA
The process of ensuring that all policies, procedures, and standards are met is a function of which process?
Education
Enforcement
Responsibility
Change management
Mercury Technical Services is formulating a set of guidelines that outline the components of effective security management. After these have been tried and tested at the Anderson branch, they will be rolled out to all other divisions. What is this set of guidelines called?
Best practices
Forensics
Chain of evidence
Use policy
Which policy identifies the files and data that must be archived?
Information classification policy
Use policy
Logs and inventories policy
Information retention policy
Which policy defines upgrade and systems requirements?
Configuration management policy
Use policy
Logs and inventory policy
Backup policy
A policy review is under way. The new head of HR wants to show that a formal policy exists for every aspect of IT. You've been assigned the role of producing whatever information he asks for. Which policy dictates the processes used to create archival copies of records?
Backup policy
Security policy
Use policy
User management policy
Which topic would not normally be covered in a user-oriented security-awareness program?
Security management policy
Use policy
Network technology and administration
Account and password criteria
You're a new hire at SMT. One of your job responsibilities is to provide monthly training sessions on security topics over lunch. You want to prioritize the presentations and first give those that are the most important. Which group would most benefit from an overall briefing on security threats and issues?
Management
Users
Developers
Network administrators
Thanks to the awarding of a grant, you'll now be able to replace all the outdated workstations with newer models. Many of those workstations will be coming from the business office. Which of the following should occur when a computer system becomes surplus?
All files should be erased.
Disk drives should be initialized.
Disk drives should be formatted.
Computer screens should be degaussed.
BIOS-based passwords are typically lost when what occurs on a workstation?
Electrical power is removed.
The cover is removed.
The computer's battery is removed and replaced.
The hard drive is changed.
Which type of policy should define the use of USB devices?
Information retention policy
Configuration management policy
Change documentation
Acceptable use policy
You are interested in simplifying security management at your site. The simplest way to manage users is by assigning them to which of the following entities?
Groups
Pools
Units
Categories
Which of the following hold permissions for users and groups, such as Read-Only, Full Control, or Change?
Group policies
Access control lists
SIDs
DNS
If you want to carefully govern who can reset the password of a user object, which of the following permissions should you focus on?
Logical token
Landlord
Domain password
Change
Which of the following are most similar in content to certificates?
Password policies
Device access policies
Datagrams
Logical tokens
Which of the following allow you to automatically implement restrictions on operating system components?
Group policies
Access control lists
SIDs
DNS
Which type of policy should define the use of cell phones within an organization?
Information retention policy
Configuration management policy
Change documentation
Acceptable use policy
18.118.193.7