Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Which of the following functions needed to implement the information security program identifies the sources of risk and may offer advice on controls that can reduce the risk?
(Multiple Choice)
4.9/5
(42)
Which of the following methods of training results in the lowest cost for the organization?
(Multiple Choice)
4.8/5
(37)
In general,security programs are overstaffed for the tasks that they have been assigned.
(True/False)
4.9/5
(42)
Security spending per user and per machine ____ as organizations grow,leaving most handcuffed when it comes to implementing effective security procedures.
(Multiple Choice)
4.9/5
(37)
Which of the following is an advantage of the one-on-one method of training?
(Multiple Choice)
4.9/5
(36)
Very large organizations spend an average of ____ of the IT budget on security.
(Multiple Choice)
4.7/5
(46)
Which of the following is the first step in the process of implementing training?
(Multiple Choice)
4.8/5
(43)
List the steps of the seven-step methodology for implementing training.
(Essay)
4.8/5
(35)
____ are accountable for the day-to-day operation of the information security program.
(Multiple Choice)
4.9/5
(32)
The term information security program describes the structure and organization of the effort to contain the risks to the information assets of an organization._________________________
(True/False)
4.8/5
(29)
The planning function needed to implement the information security program often takes a project management approach to planning.
(True/False)
4.8/5
(30)
The information security budgets of very large organizations grow faster than their IT budgets.
(True/False)
4.7/5
(28)
A study of information security positions found that positions can be classified into one of three types: ____________________ are the real technical types,who create and install security solutions.
(Short Answer)
4.8/5
(40)
Large organizations tend to spend ____ on security as smaller organizations.
(Multiple Choice)
4.8/5
(45)
Which of the following would be responsible for configuring firewalls and IDSs,implementing security software,and diagnosing and troubleshooting problems?
(Multiple Choice)
4.8/5
(38)
When it comes to the personnel budget,in general,security programs are ____________________ for the tasks they have been assigned.
(Short Answer)
4.8/5
(29)
Which of the following is an advantage of the formal class method of training?
(Multiple Choice)
4.9/5
(34)
Training is most effective when it is designed for a specific category of users.
(True/False)
4.8/5
(34)
An advantage of ____ training is that it can be live,or can be archived and viewed at the trainee's convenience.
(Multiple Choice)
4.7/5
(44)
Effective training and awareness programs make employees accountable for their actions.
(True/False)
4.9/5
(26)
Showing 81 - 100 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)