Page 771 - StudyBook.pdf
P. 771

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  755

                 Self Test



                 A Quick Answer Key follows the Self Test questions. For complete questions,
                 answers, and explanations to the Self Test questions in this chapter as well as
                 the other chapters in this book, see the Self Test Appendix.


                 1. An organization has just installed a new T1 Internet connection, which
                    employees may use to research issues related to their jobs and send e-mail.
                    Upon reviewing firewall logs, you see that several users have visited inappro-
                    priate sites and downloaded illegal software. Finding this information, you con-
                    tact senior management to have the policy relating to this problem enforced.
                    Which of the following policies would you recommend as applicable to this
                    situation?
                    A. Privacy policy

                    B. Acceptable use policy
                    C. HR Policy
                    D. SLAs

                 2. You are concerned about the possibility of hackers using programs to deter-
                    mine the passwords of users.You decide to create a policy that provides infor-
                    mation on creating strong passwords, and want to provide an example of a
                    strong password.Which of the following is the strongest password?
                    A. strong

                    B. PKBLT
                    C. ih8Xams!
                    D. 12345

                 3. You are developing a policy that will address that hard disks are to be properly
                    erased using special software, and that any CDs or DVDs that are to be dam-
                    aged by scarring or breaking them before they are thrown away. It is the hope
                    of the policy that any information that is on the media will not fall into the
                    wrong hands after properly discarding them.What type of policy are you
                    creating?







                                                                              www.syngress.com
   766   767   768   769   770   771   772   773   774   775   776