Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
The purpose of SETA is to enhance security in all but which of the following ways?
(Multiple Choice)
4.8/5
(39)
An organization's information security program refers to theentire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information _______ of the organization.
(Short Answer)
4.8/5
(34)
Small organizations spend more per user on security than medium- and large-sized organizations.
(True/False)
4.7/5
(40)
In the early stages of planning,the project planner should attempt to specify completion dates only for major employees within the project._________________________
(True/False)
5.0/5
(39)
Which function needed to implement the information security program includes researching,creating,maintaining,and promoting information security plans?
(Multiple Choice)
4.7/5
(37)
Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation?
(Multiple Choice)
4.9/5
(34)
Advanced technical training can be selected or developed based on which of the following?
(Multiple Choice)
4.9/5
(39)
Which of the following is a disadvantage of the one-on-one training method?
(Multiple Choice)
4.8/5
(35)
Which of the following is true about the security staffing,budget,and needs of a medium-sized organization?
(Multiple Choice)
4.8/5
(32)
List the steps of the seven-step methodology for implementing training.
(Essay)
4.7/5
(37)
Which of the following variables is the most influential in determining how to structure an information security program?
(Multiple Choice)
4.8/5
(36)
GGG security is commonly used to describe which aspect of security?
(Multiple Choice)
4.8/5
(39)
Project ____________________is adescription of a project's features,capabilities,functions,and quality level,used as the basis of a project plan.
(Short Answer)
4.8/5
(40)
What is the purpose of a security awareness program?What advantage does an awareness program have for the InfoSec program?
(Essay)
4.8/5
(34)
Which of the following is NOT a step in the process of implementing training?
(Multiple Choice)
4.9/5
(29)
Showing 41 - 55 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)