Chapter Review

1. How important is it to involve other departments and employees in the crafting of security policies?

2. True or false: It is a well-known fact that users circumvent security policies that are too restrictive. Explain your answer.

3. What are three things that you should keep in mind when writing or reviewing a security policy?

4. Why is it important to include an enforcement section in every security policy?

5. An Acceptable Use Policy defines what kind of expectations for users?

6. When and under what circumstances should you reveal your password to someone?

7. Which of the following sample passwords would be considered effective when checked against the corporate password policy?

a. wolfpack

b. thomas67

c. simonisnot4

d. sJ8Dtt&efs

e. Missing$4u

8. Define VPN and the role it can play within a company’s network infrastructure.

9. VPNs support a technology called split tunneling. Define this technology and explain whether it should be used in a network.

10. How frequently should security policies be updated or reviewed?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.170.187