D: The exit interview is part of the termination process.
A: Read only is the lowest privilege level.
B: The first step in hiring a new employee is the creation of a job description. Without a job description there is no clear understanding of who is needed and the work tasks they will be required to perform.
A: Directive or deterrent controls are used to encourage compliance with other security controls.
B: The Orange book defines Operational and Life Cycle assurance.
A: Operations security is primarily concerned with protecting assets from threats.
B: The security practice of ensuring that no one individual as complete control or access over a system’s security mechanism is known as separation of duties.
C: Trusted recovery is a process that ensures a system’s security is not violated when it encounters a failure requiring a restoration.
B: Trusted recovery is not a safeguard against collusion. It is a safeguard against failure states encountered by the OS or software which prevents the system from restarting into an insecure state.
C: The primary goal of configuration or change management is to ensure that security is not diminished.
D: Mandatory vacations are used to perform auditing.
D: When an automated trusted recovery is performed, the system must restore itself to a secure state.
A: The primary goal of configuration change management is to ensure that all changes to the system do not diminish security.
B: Configuration change management is not a distribution mechanism.
C: Mandatory vacations allow for job auditing to ensure compliance with security policy and laws.
A: Biometric enrollment is not a form of monitoring. Biometric enrollment is often a determining factor in whether or not a biometric identification or authenticating device will be accepted by the user community. If enrollment takes longer than minutes, most users will be unwilling to use it.
B: Trend or traffic analysis is the examination of traffic patterns rather than packet contents.
C: Security controls should be transparent to the authorized user.
A: Split knowledge is when no single person has total control over a system’s security mechanisms.
B: Separation of duties is a split-knowledge security control.
C: Least privilege is a security mechanism that requires that users have the minimum amount of access that is absolutely required by their job tasks and that they have that access for the shortest amount of time.
A: The top priority of configuration or change control management is to prevent changes from diminishing security.
C: Since changes are not supposed to alter the security environment, there should be no need to change or alter the security policy. Therefore Updating the security policy is not one of the five generally recognized procedural steps to implement configuration or change control management.
C: Security testing, design specification and testing, configuration management, and trusted distribution are all elements of Life cycle assurance as defined by the Orange book.