Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
In smaller organizations,the security administrator frequently turns to commercial off-the-shelf software to lower the costs of assessing and implementing security._________________________
(True/False)
4.8/5
(38)
Which of the following is a disadvantage of user support groups?
(Multiple Choice)
4.9/5
(41)
The Computer Security Act of 1987 requires federal agencies to provide mandatory periodic training in computer security encryption and accepted computer practices to all employees involved with the management,use,or operation of their computer systems._________________________
(True/False)
4.7/5
(33)
The typical security staff in a small organization consists of ____.
(Multiple Choice)
4.9/5
(40)
In large organizations,it is recommended to separate information security functions into four areas,including: non-technology business functions,IT functions,information security customer service functions and information security compliance enforcement functions._________________________
(True/False)
4.9/5
(31)
Which of the following is an advantage of the user support group form of training?
(Multiple Choice)
4.8/5
(40)
Security officers and investigators are part of the ____________________ aspect of security.
(Short Answer)
4.7/5
(23)
____ organizations have information security budgets that grow faster than their IT budgets.
(Multiple Choice)
4.9/5
(36)
A(n)medium-sized organization typically spends about 20 percent of the total IT budget on information security.________________________
(True/False)
4.8/5
(27)
____________________ personnel are the front line of incident response,as they may be able to diagnose and recognize an attack while handling calls from users having problems with their computers,the network,or Internet connections.
(Short Answer)
4.8/5
(32)
A(n)small-sized organization typically spends about 5 percent of the total IT budget on information security._________________________
(True/False)
4.9/5
(36)
Employee behavior that endangers the security of the organization's information can be modified through security awareness and ____________________.
(Short Answer)
4.7/5
(34)
A good time to conduct training for general users is during ____.
(Multiple Choice)
4.8/5
(38)
The security education,training,and awareness (SETA)program is designed to reduce the incidence of external security attacks.
(True/False)
5.0/5
(42)
Which of the following is NOT a step in the process of implementing training?
(Multiple Choice)
4.7/5
(37)
Individuals who perform routine monitoring activities are called security technicians.._________________________
(True/False)
5.0/5
(33)
One of the most commonly implemented but least effective security methods is the security awareness program.
(True/False)
4.9/5
(33)
The responsibilities of the ____ are a combination of the responsibilities of a security technician and a security manager.
(Multiple Choice)
4.9/5
(36)
Showing 101 - 120 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)