Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following functions needed to implement the information security program identifies the sources of risk and may offer advice on controls that can reduce the risk?

(Multiple Choice)
4.9/5
(42)

Which of the following methods of training results in the lowest cost for the organization?

(Multiple Choice)
4.8/5
(37)

In general,security programs are overstaffed for the tasks that they have been assigned.

(True/False)
4.9/5
(42)

Security spending per user and per machine ____ as organizations grow,leaving most handcuffed when it comes to implementing effective security procedures.

(Multiple Choice)
4.9/5
(37)

Which of the following is an advantage of the one-on-one method of training?

(Multiple Choice)
4.9/5
(36)

Very large organizations spend an average of ____ of the IT budget on security.

(Multiple Choice)
4.7/5
(46)

Which of the following is the first step in the process of implementing training?

(Multiple Choice)
4.8/5
(43)

List the steps of the seven-step methodology for implementing training.

(Essay)
4.8/5
(35)

____ are accountable for the day-to-day operation of the information security program.

(Multiple Choice)
4.9/5
(32)

The term information security program describes the structure and organization of the effort to contain the risks to the information assets of an organization._________________________

(True/False)
4.8/5
(29)

The planning function needed to implement the information security program often takes a project management approach to planning.

(True/False)
4.8/5
(30)

The information security budgets of very large organizations grow faster than their IT budgets.

(True/False)
4.7/5
(28)

A study of information security positions found that positions can be classified into one of three types: ____________________ are the real technical types,who create and install security solutions.

(Short Answer)
4.8/5
(40)

Large organizations tend to spend ____ on security as smaller organizations.

(Multiple Choice)
4.8/5
(45)

Which of the following would be responsible for configuring firewalls and IDSs,implementing security software,and diagnosing and troubleshooting problems?

(Multiple Choice)
4.8/5
(38)

When it comes to the personnel budget,in general,security programs are ____________________ for the tasks they have been assigned.

(Short Answer)
4.8/5
(29)

Which of the following is an advantage of the formal class method of training?

(Multiple Choice)
4.9/5
(34)

Training is most effective when it is designed for a specific category of users.

(True/False)
4.8/5
(34)

An advantage of ____ training is that it can be live,or can be archived and viewed at the trainee's convenience.

(Multiple Choice)
4.7/5
(44)

Effective training and awareness programs make employees accountable for their actions.

(True/False)
4.9/5
(26)
Showing 81 - 100 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)