Exam 5: Developing the Security Program
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.
(Short Answer)
4.7/5
(33)
The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.
(Short Answer)
4.7/5
(44)
What is the security education,training,and awareness program? Describe how the program aims to enhance security.
(Essay)
4.9/5
(32)
What is the Chief Information Security Office primarily responsible for?
(Essay)
4.7/5
(35)
An organization's information security program refers to the entire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information _______ of the organization.
(Short Answer)
4.9/5
(39)
What is the purpose of a security awareness program? What advantage does an awareness program have for the InfoSec program?
(Essay)
4.8/5
(38)
A SETA program consists of three elements: security education,security training,and which of the following?.
(Multiple Choice)
4.9/5
(33)
The work breakdown structure (WBS)can only be prepared with a complex specialized desktop PC application.
(True/False)
4.8/5
(33)
The purpose of SETA is to enhance security in all but which of the following ways?
(Multiple Choice)
4.8/5
(36)
Which of the following variables is the most influential in determining how to structure an information security program?
(Multiple Choice)
4.8/5
(28)
Advanced technical training can be selected or developed based on which of the following?
(Multiple Choice)
4.9/5
(27)
Which security functions are normally performed by IT groups outside the InfoSec area of management control?
(Essay)
4.8/5
(27)
Explain the conflict between the goals and objectives of the CIO and the CISO.
(Essay)
4.9/5
(27)
Which of the following is the most cost-effective method for disseminating security information and news to employees?
(Multiple Choice)
4.9/5
(39)
In larger organizations,responsible for some aspect of information security; in smaller organizations,this title may be assigned to the only or senior security administrator.
(Multiple Choice)
4.7/5
(36)
Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk?
(Multiple Choice)
5.0/5
(43)
Which of the following would be responsible for configuring firewalls and IDPSs,implementing security software,and diagnosing and troubleshooting problems?
(Multiple Choice)
4.9/5
(26)
Showing 21 - 40 of 65
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)