IT Roles and Responsibilities

Exit

Question 1 of 1

  Time Left


0 [{"id":53424,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:40:51","updated_at":"2016-04-12 01:16:20","questionName":"Responsible for drafting security policies, standards, and supporting guidelines, procedures, and baselines. Provides guidance for technical security issues, emerging threats, interpretation of regulations and industry trends.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53435,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:11:10","updated_at":"2016-04-12 01:16:20","questionName":"Often the first indicators of security issues or incidents and responsible for contacting the computer security incident response team (CIRT) when a situation meets certain criteria.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53429,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:54:41","updated_at":"2016-04-12 01:16:20","questionName":"Responsible for designing security controls into information systems, testing the controls, and implementing the systems in production environments. Also work with business owners and security professionals to ensure designed solutions provide security controls commensurate with requirements.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53433,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:06:15","updated_at":"2016-04-12 01:16:20","questionName":"Helps develop and set baselines, policies, standards, and guidelines by defining security program elements and ensures they are carried out and practiced properly.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53431,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:00:33","updated_at":"2016-04-12 01:16:20","questionName":"Configures and maintains hardware and OS to ensure that the information is available and accessible.Also responsible for patch management and software distribution. Tests and implements system upgrades, provides vulnerability management and mitigates vulnerabilities.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53432,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:03:34","updated_at":"2016-04-12 01:16:20","questionName":"Manage the installation, maintenance and ongoing operation of surveillance systems, alarm systems, card reader access control systems. Act as a deterrent to unauthorized access and provide for employee safety.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53421,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:35:49","updated_at":"2016-04-12 01:16:20","questionName":"Maintains overall responsibility for protection of the information assets.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53427,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:50:03","updated_at":"2016-04-12 01:16:20","questionName":"Provide independent assurance to the management on the appropriateness of the security controls. Examines the information system and determines if it is designed, configured, implemented, operated and management in a way ensuring that the organizational objectives are being achieved.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53428,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:52:11","updated_at":"2016-04-12 01:16:20","questionName":"Develop contingency plans to prepare for anything that could have the ability to impact the company's objectives negatively.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53425,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:43:50","updated_at":"2016-04-12 01:16:20","questionName":"Assign appropriate classification to information assets, ensure the business information is protected by certain controls, review classification and access rights. Also determines criticality, sensitivity, retention, backups, and safeguards.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53423,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:38:24","updated_at":"2016-04-12 01:16:20","questionName":"Directs, coordinates, plans and organizes information security activities throughout the organization. Also responsible for the design, implementation, management, and review of the organization's security policies, standards, procedures, baselines and guidelines.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53426,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:47:01","updated_at":"2016-04-12 01:16:20","questionName":"Ensure that the information is available to the end users and backed up. Information may be stored in files, databases, or systems and requires access rights to the information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53430,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:57:40","updated_at":"2016-04-12 01:16:20","questionName":"Manages user access request process and ensures that privileges are provided to those individuals who have been authorized for access. Move, Add, Change user accounts and add or remove privileges as necessary. Also maintains records of access request approvals and produces reports to demonstrate compliance with policiies.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53434,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 01:09:01","updated_at":"2016-04-12 01:16:20","questionName":"Serves as the first person to interact with outsiders to minimize the risk of divulging useful company information or providing unauthorized physical access","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":53419,"quiz_id":"4253","answer_id":null,"answerType_id":"0","created_at":"2016-04-12 00:34:28","updated_at":"2016-04-12 01:16:20","questionName":"Protects information assets on a daily basis through adherence to the security policies that have been communicated.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
53424
0
120
block

Responsible for drafting security policies, standards, and supporting guidelines, procedures, and baselines. Provides guidance for technical security issues, emerging threats, interpretation of regulations and industry trends.

Select the Correct Answers  

(0/0)












53435
0
120
none
53429
0
120
none
53433
0
120
none
53431
0
120
none
53432
0
120
none
53421
0
120
none
53427
0
120
none
53428
0
120
none
53425
0
120
none
53423
0
120
none
53426
0
120
none
53430
0
120
none
53434
0
120
none
53419
0
120
none