Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In ____ organizations,the average amount spent on security per user is less than in any other type of organization.

(Multiple Choice)
4.8/5
(36)

The security education,training,and awareness (SETA)program is designed to ____ by/of members of the organization.

(Multiple Choice)
4.8/5
(37)

Two methods for customizing training for users are by functional background and by ____________________.

(Short Answer)
4.8/5
(28)

Which of the following functions needed to implement the information security program evaluates risk present in IT initiatives and/or systems?

(Multiple Choice)
4.9/5
(35)

On average,the security budget of a medium-sized organization is ____ of the total IT budget.

(Multiple Choice)
4.9/5
(30)

Training for managers would be more detailed than that for security staff.

(True/False)
4.8/5
(33)

____________________ training consists of trainees learning the specifics of their jobs while working,using the software,hardware,and procedures they will continue to use.

(Short Answer)
4.8/5
(33)

A SETA program consists of three elements: security education,security training,and ____.

(Multiple Choice)
4.9/5
(33)

The ____ is primarily responsible for the assessment,management,and implementation of the program that secures the organization's information.

(Multiple Choice)
4.8/5
(29)

In large organizations the information security department is often located within the ____________________ department.

(Short Answer)
4.7/5
(40)

When developing an awareness program,be sure to: Focus on people both as part of the problem and as part of the solution.

(True/False)
4.8/5
(34)

Large organizations spend a larger portion of their IT budget on security than small organizations.

(True/False)
4.8/5
(35)

To their advantage,some observers feel that small organizations avoid some threats precisely because of their small size._________________________

(True/False)
4.7/5
(35)

GGG security (which stands for ____)is commonly used to describe the physical security aspect of security.

(Multiple Choice)
4.8/5
(31)

The aim of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.

(Short Answer)
4.8/5
(36)

Distance learning/Web seminars can be low- or no-cost.

(True/False)
4.9/5
(34)

Security managers commonly report to the ____.

(Multiple Choice)
4.7/5
(33)

The organization's size and available resources also indirectly affect the size and structure of the information security program._________________________

(True/False)
4.8/5
(22)

Organizations with complex IT infrastructures are likely to require more information security support than those with less complex infrastructures.

(True/False)
4.8/5
(28)

In ____________________ training,prepackaged software provides training at the trainee's workstation.

(Short Answer)
4.8/5
(37)
Showing 61 - 80 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)