9.10. Answers to Review Questions

  1. A. All aspects of security in the organization are included in the security management policy, including the policies in options B, C, and D.

  2. B. The information classification policy discusses information sensitivity and access to information.

  3. B. The configuration management policy is concerned with how systems are configured and what software can be installed on systems.

  4. A. Change documentation involves keeping records about how your network or organization changes over time.

  5. B. Enforcement of policies, procedures, and standards is essential for effective sustainability of security efforts. The saying "Inspect what you expect" is relevant in this situation.

  6. A. The term best practices refers to the essential elements of an effective security management effort.

  7. D. Information retention policies dictate what information must be archived and how long those archives must be kept.

  8. A. Configuration management policy dictates the configurations and upgrades of systems in an organization.

  9. A. The backup policy identifies the methods used to archive electronic and paper file systems. This policy works in conjunction with the information retention and storage policies.

  10. C. Network technology and administration would not be covered in a user security-awareness program. Issues of policy, responsibilities, and importance of security would be key aspects of this program.

  11. A. Managers would derive the most benefit from a high-level explanation of security threats and issues. Users need to know how to follow the policies and why they are important. Developers and network administrators need specific and focused information on how to better secure networks and applications.

  12. B. The only way to guarantee that data and applications on a disk drive are unreadable is to perform a low-level initialization of the storage media, thereby setting every storage location into a newly initialized state. This process is also referred to as disk wiping.

  13. C. The removal and replacement of the computer battery will often cause the loss of values stored in the BIOS.

  14. D. The acceptable use policy should clearly define the use of USB devices within an organization.

  15. A. Users should be placed in groups and managed by membership in those groups.

  16. B. Access control lists (ACLs) hold permissions for users and groups.

  17. C. The domain password permission identifies who can reset the password of a user object.

  18. D. Logical tokens are similar in content to certificates. They contain the rights and access privileges of the token bearer.

  19. A. Group policies allow you to automatically implement restrictions on operating system components.

  20. D. The acceptable use policy should clearly define the use of cell phones within an organization.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.243.130