Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
The ____________________ function maintains awareness of planned and actual laws and their impact,and coordinates with outside legal council and law enforcement agencies.
Free
(Short Answer)
4.7/5
(42)
Correct Answer:
legal assessment
A security technician is usually an entry-level position.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
The three elements of a SETA program are security education,security training,and ____________________.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
security awareness
Security ____________________ involves providing members of the organization with detailed information and hands-on instruction to enable them to perform their duties securely.
(Short Answer)
4.9/5
(31)
Which of the following variables is the most influential in determining how to structure an information security program?
(Multiple Choice)
4.8/5
(40)
A security ____________________ is the most cost-effective method of disseminating security information and news to employees.
(Short Answer)
4.9/5
(43)
When users call an organization with problems with their computers,the network,or an Internet connection,they speak with the ____.
(Multiple Choice)
4.8/5
(37)
The distance learning method of training is in use when a single trainer works with multiple trainees in a formal setting._________________________
(True/False)
4.8/5
(29)
Which of the following is a disadvantage of the one-on-one training method?
(Multiple Choice)
4.7/5
(34)
A(n)large-sized organization typically spends about $300 per user on information security._________________________
(True/False)
4.8/5
(30)
An organization's size does not affect the structure of the organization's information security program.
(True/False)
4.8/5
(26)
The information security ____ is typically an expert in some aspect of information security,who is brought in when the organization makes the decision to outsource one or more aspects of its security program.
(Multiple Choice)
4.9/5
(32)
An organization's ____________________ program refers to the structure and organization of the effort that strives to contain the risks to the information assets of the organization.
(Short Answer)
4.8/5
(31)
In the on-the-job method of training,a trainer works with each trainee on an individual basis._________________________
(True/False)
4.7/5
(32)
On-the-job training can result in substandard work performance while the trainee gets up to speed.
(True/False)
4.8/5
(38)
Threats from insiders are more likely in a small organization than in a large one.
(True/False)
4.8/5
(29)
In informing and preparing employees for their role in information security,security awareness provides the "what",training provides the "how" and education provides the "why"._________________________
(True/False)
4.7/5
(34)
Small organizations spend an average of ____ of their IT budget on security.
(Multiple Choice)
4.8/5
(24)
Showing 1 - 20 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)