Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
In ____ organizations,the average amount spent on security per user is less than in any other type of organization.
(Multiple Choice)
4.8/5
(36)
The security education,training,and awareness (SETA)program is designed to ____ by/of members of the organization.
(Multiple Choice)
4.8/5
(37)
Two methods for customizing training for users are by functional background and by ____________________.
(Short Answer)
4.8/5
(28)
Which of the following functions needed to implement the information security program evaluates risk present in IT initiatives and/or systems?
(Multiple Choice)
4.9/5
(35)
On average,the security budget of a medium-sized organization is ____ of the total IT budget.
(Multiple Choice)
4.9/5
(30)
Training for managers would be more detailed than that for security staff.
(True/False)
4.8/5
(33)
____________________ training consists of trainees learning the specifics of their jobs while working,using the software,hardware,and procedures they will continue to use.
(Short Answer)
4.8/5
(33)
A SETA program consists of three elements: security education,security training,and ____.
(Multiple Choice)
4.9/5
(33)
The ____ is primarily responsible for the assessment,management,and implementation of the program that secures the organization's information.
(Multiple Choice)
4.8/5
(29)
In large organizations the information security department is often located within the ____________________ department.
(Short Answer)
4.7/5
(40)
When developing an awareness program,be sure to: Focus on people both as part of the problem and as part of the solution.
(True/False)
4.8/5
(34)
Large organizations spend a larger portion of their IT budget on security than small organizations.
(True/False)
4.8/5
(35)
To their advantage,some observers feel that small organizations avoid some threats precisely because of their small size._________________________
(True/False)
4.7/5
(35)
GGG security (which stands for ____)is commonly used to describe the physical security aspect of security.
(Multiple Choice)
4.8/5
(31)
The aim of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.
(Short Answer)
4.8/5
(36)
The organization's size and available resources also indirectly affect the size and structure of the information security program._________________________
(True/False)
4.8/5
(22)
Organizations with complex IT infrastructures are likely to require more information security support than those with less complex infrastructures.
(True/False)
4.8/5
(28)
In ____________________ training,prepackaged software provides training at the trainee's workstation.
(Short Answer)
4.8/5
(37)
Showing 61 - 80 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)