Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____________________ function maintains awareness of planned and actual laws and their impact,and coordinates with outside legal council and law enforcement agencies.

Free
(Short Answer)
4.7/5
(42)
Correct Answer:
Verified

legal assessment

A security technician is usually an entry-level position.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

True

The three elements of a SETA program are security education,security training,and ____________________.

Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Verified

security awareness

Security ____________________ involves providing members of the organization with detailed information and hands-on instruction to enable them to perform their duties securely.

(Short Answer)
4.9/5
(31)

Which of the following variables is the most influential in determining how to structure an information security program?

(Multiple Choice)
4.8/5
(40)

A security ____________________ is the most cost-effective method of disseminating security information and news to employees.

(Short Answer)
4.9/5
(43)

When users call an organization with problems with their computers,the network,or an Internet connection,they speak with the ____.

(Multiple Choice)
4.8/5
(37)

The distance learning method of training is in use when a single trainer works with multiple trainees in a formal setting._________________________

(True/False)
4.8/5
(29)

Training for management should be conducted in large groups.

(True/False)
4.8/5
(29)

A medium-sized organization has ____.

(Multiple Choice)
4.9/5
(33)

Which of the following is a disadvantage of the one-on-one training method?

(Multiple Choice)
4.7/5
(34)

A(n)large-sized organization typically spends about $300 per user on information security._________________________

(True/False)
4.8/5
(30)

An organization's size does not affect the structure of the organization's information security program.

(True/False)
4.8/5
(26)

The information security ____ is typically an expert in some aspect of information security,who is brought in when the organization makes the decision to outsource one or more aspects of its security program.

(Multiple Choice)
4.9/5
(32)

An organization's ____________________ program refers to the structure and organization of the effort that strives to contain the risks to the information assets of the organization.

(Short Answer)
4.8/5
(31)

In the on-the-job method of training,a trainer works with each trainee on an individual basis._________________________

(True/False)
4.7/5
(32)

On-the-job training can result in substandard work performance while the trainee gets up to speed.

(True/False)
4.8/5
(38)

Threats from insiders are more likely in a small organization than in a large one.

(True/False)
4.8/5
(29)

In informing and preparing employees for their role in information security,security awareness provides the "what",training provides the "how" and education provides the "why"._________________________

(True/False)
4.7/5
(34)

Small organizations spend an average of ____ of their IT budget on security.

(Multiple Choice)
4.8/5
(24)
Showing 1 - 20 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)