Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In smaller organizations,the security administrator frequently turns to commercial off-the-shelf software to lower the costs of assessing and implementing security._________________________

(True/False)
4.8/5
(38)

The ____ may also be called the Manager of Security.

(Multiple Choice)
4.9/5
(32)

Which of the following is a disadvantage of user support groups?

(Multiple Choice)
4.9/5
(41)

The Computer Security Act of 1987 requires federal agencies to provide mandatory periodic training in computer security encryption and accepted computer practices to all employees involved with the management,use,or operation of their computer systems._________________________

(True/False)
4.7/5
(33)

The typical security staff in a small organization consists of ____.

(Multiple Choice)
4.9/5
(40)

In large organizations,it is recommended to separate information security functions into four areas,including: non-technology business functions,IT functions,information security customer service functions and information security compliance enforcement functions._________________________

(True/False)
4.9/5
(31)

Which of the following is an advantage of the user support group form of training?

(Multiple Choice)
4.8/5
(40)

Security officers and investigators are part of the ____________________ aspect of security.

(Short Answer)
4.7/5
(23)

____ organizations have information security budgets that grow faster than their IT budgets.

(Multiple Choice)
4.9/5
(36)

A(n)medium-sized organization typically spends about 20 percent of the total IT budget on information security.________________________

(True/False)
4.8/5
(27)

____________________ personnel are the front line of incident response,as they may be able to diagnose and recognize an attack while handling calls from users having problems with their computers,the network,or Internet connections.

(Short Answer)
4.8/5
(32)

The security analyst is a specialized ____.

(Multiple Choice)
4.9/5
(29)

A(n)small-sized organization typically spends about 5 percent of the total IT budget on information security._________________________

(True/False)
4.9/5
(36)

Employee behavior that endangers the security of the organization's information can be modified through security awareness and ____________________.

(Short Answer)
4.7/5
(34)

A good time to conduct training for general users is during ____.

(Multiple Choice)
4.8/5
(38)

The security education,training,and awareness (SETA)program is designed to reduce the incidence of external security attacks.

(True/False)
5.0/5
(42)

Which of the following is NOT a step in the process of implementing training?

(Multiple Choice)
4.7/5
(37)

Individuals who perform routine monitoring activities are called security technicians.._________________________

(True/False)
5.0/5
(33)

One of the most commonly implemented but least effective security methods is the security awareness program.

(True/False)
4.9/5
(33)

The responsibilities of the ____ are a combination of the responsibilities of a security technician and a security manager.

(Multiple Choice)
4.9/5
(36)
Showing 101 - 120 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)