Podcast
Questions and Answers
What is the primary purpose of collecting organization-specific identification and access badges during employee termination?
What is the primary purpose of collecting organization-specific identification and access badges during employee termination?
- To issue a final paycheck
- To maintain a record of employee identification
- To prevent employee access to company resources (correct)
- To arrange for a security escort
What is the recommended time to terminate an employee?
What is the recommended time to terminate an employee?
- During a company-wide meeting
- At the end of their shift midweek (correct)
- At the beginning of the workday
- During their lunch break
Which security role is responsible for implementing and enforcing security policies?
Which security role is responsible for implementing and enforcing security policies?
- Senior manager
- User
- Data owner
- Security professional (correct)
What is the primary goal of security management planning?
What is the primary goal of security management planning?
What should be done with the employee's network user account after termination?
What should be done with the employee's network user account after termination?
Who is responsible for ensuring that the released employee does not attempt to reenter the building without an escort?
Who is responsible for ensuring that the released employee does not attempt to reenter the building without an escort?
What is the purpose of informing all security personnel and entrance monitors during employee termination?
What is the purpose of informing all security personnel and entrance monitors during employee termination?
What is the role of the data custodian in a secured environment?
What is the role of the data custodian in a secured environment?
What is the primary responsibility of the senior manager in a secured environment?
What is the primary responsibility of the senior manager in a secured environment?
What is the purpose of security management planning in relation to security policies?
What is the purpose of security management planning in relation to security policies?