Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Security training and awareness activities can be undermined if information security personnel do not set a good example._________________________
(True/False)
4.9/5
(35)
The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.
(Short Answer)
4.8/5
(34)
Computer-based training (CBT)allows users to learn from each other.
(True/False)
4.8/5
(33)
The ____________________ program is designed to reduce the incidence of accidental security breaches by members of the organization.
(Short Answer)
4.9/5
(37)
Training for ____ may require the use of consultants or outside training organizations.
(Multiple Choice)
4.8/5
(37)
In the ____________________ method of training,a single trainer works with multiple trainees in a formal setting.
(Short Answer)
5.0/5
(36)
Explain the conflict between the goals and objectives of the CIO and the CISO.
(Essay)
4.9/5
(33)
An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.
(Short Answer)
4.8/5
(36)
Keys to a good security ____________________ series include varying the content and keeping posters updated.
(Short Answer)
4.9/5
(34)
Large organizations spend an average of ____ of the IT budget on security.
(Multiple Choice)
4.8/5
(29)
Several keys to a good poster series include 1)standardizing the content and keeping posters updated,2)making them complex,and thus visually interesting,3)making the message clear and 4)reminding users of penalties for non-compliance.
(True/False)
4.9/5
(37)
Which of the following training methods uses a sink-or-swim approach?
(Multiple Choice)
4.9/5
(36)
Managers often resist organized training of any kind._________________________
(True/False)
4.9/5
(39)
Showing 121 - 133 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)