Chapter Review

1. How important is it to involve other departments and employees in the crafting of security policies?

2. True or false: It is a well-known fact that users circumvent security policies that are too restrictive. Explain your answer.

3. What are three things that you should keep in mind when writing or reviewing a security policy?

4. Why is it important to include an enforcement section in every security policy?

5. An Acceptable Use Policy defines what kind of expectations for users?

6. When and under what circumstances should you reveal your password to someone?

7. Which of the following sample passwords would be considered effective when checked against the corporate password policy?

a. wolfpack

b. thomas67

c. simonisnot4

d.

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.