Home
You may like this!
11.
Which of the following is the weakest element in any security solution?
  • A.
    Software products
  • B.
    Internet connections
  • C.
    Security policies
  • D.
    Humans
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Regardless of the specifics of a security solution, humans are the weakest element.
Report
Name Email  
12.
When seeking to hire new employees, what is the first step?
  • A.
    Create a job description.
  • B.
    Set position classification.
  • C.
    Screen candidates.
  • D.
    Request resumes.
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
The first step in hiring new employees is to create a job description. Without a job description, there is no consensus on what type of individual needs to be found and hired.
Report
Name Email  
13.
Which of the following is a primary purpose of an exit interview?
  • A.
    To return the exiting employee’s personal belongings
  • B.
    To review the nondisclosure agreement
  • C.
    To evaluate the exiting employee’s performance
  • D.
    To cancel the exiting employee’s network access accounts
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The primary purpose of an exit interview is to review the nondisclosure agreement (NDA) and other liabilities and restrictions placed on the former employee based on the employment agreement and any other security‐related documentation.
Report
Name Email  
14.
When an employee is to be terminated, which of the following should be done?
  • A.
    Inform the employee a few hours before they are officially terminated.
  • B.
    Disable the employee’s network access just as they are informed of the termination.
  • C.
    Send out a broadcast email informing everyone that a specific employee is to be terminated.
  • D.
    Wait until you and the employee are the only people remaining in the building before announcing the termination.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
You should remove or disable the employee’s network user account immediately before or at the same time they are informed of their termination.
Report
Name Email  
15.
If an organization contracts with outside entities to provide key business functions or services, such as account or technical support, what is the process called that is used to ensure that these entities support sufficient security?
  • A.
    Asset identification
  • B.
    Third-party governance
  • C.
    Exit interview
  • D.
    Qualitative analysis
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Third party governance is the application of security oversight on third parties that your organization relies on.
Report
Name Email