Personal Sec Flashcards
(279 cards)
Which of the following is not a best practice for personnel security
Limiting the use of background checks
Which of the following is not a purpose of personnel security
Ensuring physical security measures are in place
Which of the following is an example of a personnel security control
Two factor authentication
What is the purpose of background checks in personnel security
To verify the identity and qualifications of job applicants
To assess the trustworthiness and reliability of individuals
To identify any potential security risks
What is the purpose of a security clearance
To grant access to classified information
To assess a persons trustworthiness and loyalty
To determine if a person is eligible for certain positions
In the context of physical security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
What is the primary function of a legal hold notice
Informing relevant parties to preserve evidence
Which of the following is a potential threat to personnel security
Social Engineering
Insider Threats
Physical Security Breaches
What is the primary goal of personnel security
To prevent unauthorized access to sensitive information
To maintain confidentiality of information
To prevent theft and sabotage
To ensure the integrity of operations
Which of the following is not a purpose of personnel security
Ensuring the physical security of facilities
What is the purpose of security awareness training program in personnel security
To educate employees about potential security threats and best practices
Which of the following is a responsibility of the individual in the personnel security process
Reporting security incidents
Which of the following is a key principle of personnel security
Need to know principle
Least privilege principle
Separation of duties principle
What is the purpose of a personnel security policy
To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations
During a sting operation, what is the primary goal of the decoy
To trick the suspect into committing a crime
To induce a suspect to commit a crime for evidence collection
What is the purpose of conducting background checks in personnel security
To identify potential risks or threats
To verify employment history
To access criminal records
To evaluate financial stability
Which of the following is a key characteristic of the PEACE model of interviewing
Preparation and Planning
which of the following is an example of personnel security control
Security awareness training
Which of the following is a characteristic of secure entrance control system
Strong access controls
What is the purpose a background check in personnel security
To verify an individuals identity
To assess an individuals character and trustworthiness
To ensure an individual meets the requirements for the specific job
Which of the following is a personnel security best practice
Regularly updating access control lists
Conducting background checks on new employee
Implementing a strong password policy
What is the role of pre employment training
To verify the suitability of potential employees
Which of the following is an example of personnel security control
Access Control Measures
Security Awareness Training
Incident response procedures
What is the role of employee training in personnel security
To ensure employees understand security policies and procedures