Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

GGG security is commonly used to describe which aspect of security? 

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

C

Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation? 

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

B

Typically considered the top information security officer in an organization.

(Multiple Choice)
4.8/5
(25)

On-the-job training can result in substandard work performance while the trainee gets up to speed.

(True/False)
4.9/5
(35)

What are the components of the security program element described as preparing for contingencies and disasters?

(Essay)
4.9/5
(41)

List the steps of the seven-step methodology for implementing training.

(Essay)
4.9/5
(34)

An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.

(Short Answer)
4.8/5
(28)

A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on plan's the progress is complete.

(Short Answer)
4.8/5
(37)

Threats from insiders are more likely in a small organization than in a large one.

(True/False)
4.9/5
(43)

The goal of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.

(Short Answer)
4.9/5
(37)

Which of the following is an advantage of the formal class method of training? 

(Multiple Choice)
5.0/5
(39)

Each organization has to determine its own project management methodology for IT and information security projects.

(True/False)
4.9/5
(36)

Which of the following is true about a company's InfoSec awareness Web site? 

(Multiple Choice)
4.8/5
(30)

The ____________________ program is designed to reduce the occurrence of accidental security breaches by members of the organization.

(Essay)
4.9/5
(31)

(Multiple Choice)
5.0/5
(41)

Occurs when a project manager spends more time working in the project management software than accomplishing meaningful project work.

(Multiple Choice)
5.0/5
(31)

The security education,training,and awareness (SETA)program is designed to reduce the occurence of external security attacks.

(True/False)
4.9/5
(39)

Project ____________________ is a description of a project's features,capabilities,functions,and quality level,used as the basis of a project plan.

(Short Answer)
4.8/5
(35)

Which of the following is a disadvantage of the one-on-one training method? 

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)