Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
GGG security is commonly used to describe which aspect of security?
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
C
Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
Typically considered the top information security officer in an organization.
(Multiple Choice)
4.8/5
(25)
On-the-job training can result in substandard work performance while the trainee gets up to speed.
(True/False)
4.9/5
(35)
What are the components of the security program element described as preparing for contingencies and disasters?
(Essay)
4.9/5
(41)
List the steps of the seven-step methodology for implementing training.
(Essay)
4.9/5
(34)
An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.
(Short Answer)
4.8/5
(28)
A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on plan's the progress is complete.
(Short Answer)
4.8/5
(37)
Threats from insiders are more likely in a small organization than in a large one.
(True/False)
4.9/5
(43)
The goal of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.
(Short Answer)
4.9/5
(37)
Which of the following is an advantage of the formal class method of training?
(Multiple Choice)
5.0/5
(39)
Each organization has to determine its own project management methodology for IT and information security projects.
(True/False)
4.9/5
(36)
Which of the following is true about a company's InfoSec awareness Web site?
(Multiple Choice)
4.8/5
(30)
The ____________________ program is designed to reduce the occurrence of accidental security breaches by members of the organization.
(Essay)
4.9/5
(31)
Occurs when a project manager spends more time working in the project management software than accomplishing meaningful project work.
(Multiple Choice)
5.0/5
(31)
The security education,training,and awareness (SETA)program is designed to reduce the occurence of external security attacks.
(True/False)
4.9/5
(39)
Project ____________________ is a description of a project's features,capabilities,functions,and quality level,used as the basis of a project plan.
(Short Answer)
4.8/5
(35)
Which of the following is a disadvantage of the one-on-one training method?
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 65
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)