Deck 5: Developing the Security Program

Full screen (f)
exit full mode
Question
Organizations with complex IT infrastructures are likely to require more information security support than those with less complex infrastructures.
Use Space or
up arrow
down arrow
to flip the card.
Question
Training is most effective when it is designed for a specific category of users.
Question
Large organizations spend a larger portion of their IT budget on security than small organizations.
Question
The planning function needed to implement the information security program often takes a project management approach to planning.
Question
The professional agencies such as SANS,ISC2,ISSA and CSI offer industry training conferences and programs that are ideal for the average employee.
Question
According to Charles Cresson Wood,"Reporting directly to top management is not advisable for the Information Security Department Manager [or CISO] because it impedes objectivity and the ability to perceive what's truly in the best interest of the organization as a whole,rather than what's in the best interest of a particular department."
Question
A security administrator does not require technical knowledge.
Question
Training for management should be conducted in large groups.
Question
The information security budgets of very large organizations grow faster than their IT budgets.
Question
In small organizations,security training and awareness is most commonly conducted on a one-on-one basis.
Question
Providing training to general users on policies ensures that those policies will be read and understood.
Question
The size of the information security budget usually corresponds to the size of the organization.
Question
Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.
Question
In general,security programs are overstaffed for the tasks that they have been assigned.
Question
According to Briney and Prince,"Security spending per user and per machine declines exponentially as organizations grow."
Question
Small organizations spend more per user on security than medium- and large-sized organizations.
Question
Threats from insiders are more likely in a small organization than in a large one.
Question
A security technician is usually an entry-level position.
Question
The security education,training,and awareness (SETA)program is designed to reduce the incidence of external security attacks.
Question
An organization's size does not affect the structure of the organization's information security program.
Question
The scope of the security training program should focus on information security personnel responsible for the protection of organizational information assets.
Question
On-the-job training can result in substandard work performance while the trainee gets up to speed.
Question
The term information security program describes the structure and organization of the effort to contain the risks to the information assets of an organization._________________________
Question
Several keys to a good poster series include 1)standardizing the content and keeping posters updated,2)making them complex,and thus visually interesting,3)making the message clear and 4)reminding users of penalties for non-compliance.
Question
One of the most commonly implemented but least effective security methods is the security awareness program.
Question
Distance learning/Web seminars can be low- or no-cost.
Question
Computer-based training (CBT)allows users to learn from each other.
Question
The organization's size and available resources also indirectly affect the size and structure of the information security program._________________________
Question
In smaller organizations,the security administrator frequently turns to commercial off-the-shelf software to lower the costs of assessing and implementing security._________________________
Question
When developing an awareness program,be sure to: Focus on people both as part of the problem and as part of the solution.
Question
In the self-study method of training,trainees learn the specifics of their jobs through performing their jobs.
Question
The average amount spent on security per user in a(n)very large organization is less than that in any other type of organization._________________________
Question
Very large organizations tend to have the largest budget per user of all organizational sizes discussed._________________________
Question
A(n)small-sized organization typically spends about 5 percent of the total IT budget on information security._________________________
Question
Effective training and awareness programs make employees accountable for their actions.
Question
A(n)medium-sized organization typically spends about 20 percent of the total IT budget on information security.________________________
Question
In large organizations,it is recommended to separate information security functions into four areas,including: non-technology business functions,IT functions,information security customer service functions and information security compliance enforcement functions._________________________
Question
An organization's size is the variable that has the greatest influence on the structure of the organization's information security program._________________________
Question
A(n)large-sized organization typically spends about $300 per user on information security._________________________
Question
Training for managers would be more detailed than that for security staff.
Question
In the on-the-job method of training,a trainer works with each trainee on an individual basis._________________________
Question
A security trinket program is one of the most expensive security awareness programs._________________________
Question
Security education involves providing members of the organization with detailed information and hands-on instruction to enable them to perform their duties securely._________________________
Question
To their advantage,some observers feel that small organizations avoid some threats precisely because of their small size._________________________
Question
The purpose of the CAEIAE program is to enhance security by building in-depth knowledge,by developing security-related skills and knowledge,by improving awareness of the need to protect system resources._________________________
Question
The typical security staff in a small organization consists of ____.

A) one person
B) one to two people
C) one to three people
D) two to five people
Question
In informing and preparing employees for their role in information security,security awareness provides the "what",training provides the "how" and education provides the "why"._________________________
Question
Managers often resist organized training of any kind._________________________
Question
____ is the term used to describe the structure and organization of the effort that strives to contain the risks to the information assets of the organization.

A) Risk management
B) Security education, training and awareness program
C) Information security program
D) None of these
Question
The distance learning method of training is in use when a single trainer works with multiple trainees in a formal setting._________________________
Question
Security spending per user and per machine ____ as organizations grow,leaving most handcuffed when it comes to implementing effective security procedures.

A) declines algebraically
B) increases logarithmically
C) declines exponentially
D) increases arithmetically
Question
An organization's information security Web site should be placed on the Internet._________________________
Question
Security managers are accountable for the day-to-day operation of the information security program._________________________
Question
The Computer Security Act of 1987 requires federal agencies to provide mandatory periodic training in computer security encryption and accepted computer practices to all employees involved with the management,use,or operation of their computer systems._________________________
Question
Individuals who perform routine monitoring activities are called security technicians._________________________
Question
A convenient time to conduct training for general users is during employee orientation._________________________
Question
Security training and awareness activities can be undermined if information security personnel do not set a good example._________________________
Question
Which of the following variables is the most influential in determining how to structure an information security program?

A) Security capital budget
B) Organizational size
C) Security personnel budget
D) Organizational culture
Question
Small organizations spend an average of ____ of their IT budget on security.

A) 5%
B) 11%
C) 20%
D) 24%
Question
Security awareness and security training are designed to modify any employee behavior that endangers the security of the organization's information._________________________
Question
A medium-sized organization has ____.

A) a larger security staff than a small organization
B) a larger security budget (as percent of IT budget) than a small organization
C) a smaller security budget (as percent of IT budget) than a large organization
D) larger security needs than a small organization
Question
Which of the following functions needed to implement the information security program identifies the sources of risk and may offer advice on controls that can reduce the risk?

A) Risk management
B) Legal assessment
C) Incident response
D) Risk assessment
Question
____ are accountable for the day-to-day operation of the information security program.

A) Security administrators
B) Security managers
C) Security technicians
D) Security analysts
Question
Large organizations spend an average of ____ of the IT budget on security.

A) 5%
B) 10%
C) 11%
D) 20%
Question
Which of the following would be responsible for configuring firewalls and IDSs,implementing security software,and diagnosing and troubleshooting problems?

A) A security technician
B) A security analyst
C) A security consultant
D) The security manager
Question
Which of the following functions needed to implement the information security program implements and oversees the use of controls to reduce risk?

A) Risk assessment
B) Incident response
C) Risk management
D) Network security administration
Question
Large organizations tend to spend ____ on security as smaller organizations.

A) substantially less
B) twice as much
C) substantially more
D) about the same
Question
On average,the security budget of a medium-sized organization is ____ of the total IT budget.

A) 5%
B) 11%
C) 20%
D) 34%
Question
Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?

A) Systems testing
B) Risk assessment
C) Incident response
D) Planning
Question
Researching,creating,maintaining,and promoting information security plans is part of the ____ function needed to implement the information security program.

A) systems testing
B) policy
C) planning
D) systems security administration
Question
Very large organizations spend an average of ____ of the IT budget on security.

A) 5%
B) 6%
C) 7%
D) 11%
Question
In large organizations the information security department is often headed by the CISO who reports directly to the ____.

A) VP of Insurance and Risk Management
B) VP of Marketing
C) top computing executive or Chief Information Officer
D) Chief Operations Officer
Question
Security managers commonly report to the ____.

A) CIO
B) CISO
C) CEO
D) security analyst
Question
Which of the following functions needed to implement the information security program evaluates risk present in IT initiatives and/or systems?

A) Risk management
B) Risk assessment
C) Systems testing
D) Vulnerability assessment
Question
The ____ may also be called the Manager of Security.

A) CEO
B) CIO
C) CISO
D) Security Watchstander
Question
The security analyst is a specialized ____.

A) security administrator
B) security technician
C) security manager
D) CISO
Question
The responsibilities of the ____ are a combination of the responsibilities of a security technician and a security manager.

A) CEO
B) CISO
C) security analyst
D) security administrator
Question
The ____ is primarily responsible for the assessment,management,and implementation of the program that secures the organization's information.

A) CEO
B) CIO
C) CISO
D) COO
Question
____ organizations have information security budgets that grow faster than their IT budgets.

A) Small
B) Medium-sized
C) Large
D) Very large
Question
In ____ organizations,the average amount spent on security per user is less than in any other type of organization.

A) small
B) medium-sized
C) large
D) very large
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/133
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Developing the Security Program
1
Organizations with complex IT infrastructures are likely to require more information security support than those with less complex infrastructures.
True
2
Training is most effective when it is designed for a specific category of users.
True
3
Large organizations spend a larger portion of their IT budget on security than small organizations.
False
4
The planning function needed to implement the information security program often takes a project management approach to planning.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
5
The professional agencies such as SANS,ISC2,ISSA and CSI offer industry training conferences and programs that are ideal for the average employee.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
6
According to Charles Cresson Wood,"Reporting directly to top management is not advisable for the Information Security Department Manager [or CISO] because it impedes objectivity and the ability to perceive what's truly in the best interest of the organization as a whole,rather than what's in the best interest of a particular department."
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
7
A security administrator does not require technical knowledge.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
8
Training for management should be conducted in large groups.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
9
The information security budgets of very large organizations grow faster than their IT budgets.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
10
In small organizations,security training and awareness is most commonly conducted on a one-on-one basis.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
11
Providing training to general users on policies ensures that those policies will be read and understood.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
12
The size of the information security budget usually corresponds to the size of the organization.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
13
Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
14
In general,security programs are overstaffed for the tasks that they have been assigned.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
15
According to Briney and Prince,"Security spending per user and per machine declines exponentially as organizations grow."
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
16
Small organizations spend more per user on security than medium- and large-sized organizations.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
17
Threats from insiders are more likely in a small organization than in a large one.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
18
A security technician is usually an entry-level position.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
19
The security education,training,and awareness (SETA)program is designed to reduce the incidence of external security attacks.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
20
An organization's size does not affect the structure of the organization's information security program.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
21
The scope of the security training program should focus on information security personnel responsible for the protection of organizational information assets.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
22
On-the-job training can result in substandard work performance while the trainee gets up to speed.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
23
The term information security program describes the structure and organization of the effort to contain the risks to the information assets of an organization._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
24
Several keys to a good poster series include 1)standardizing the content and keeping posters updated,2)making them complex,and thus visually interesting,3)making the message clear and 4)reminding users of penalties for non-compliance.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
25
One of the most commonly implemented but least effective security methods is the security awareness program.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
26
Distance learning/Web seminars can be low- or no-cost.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
27
Computer-based training (CBT)allows users to learn from each other.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
28
The organization's size and available resources also indirectly affect the size and structure of the information security program._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
29
In smaller organizations,the security administrator frequently turns to commercial off-the-shelf software to lower the costs of assessing and implementing security._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
30
When developing an awareness program,be sure to: Focus on people both as part of the problem and as part of the solution.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
31
In the self-study method of training,trainees learn the specifics of their jobs through performing their jobs.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
32
The average amount spent on security per user in a(n)very large organization is less than that in any other type of organization._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
33
Very large organizations tend to have the largest budget per user of all organizational sizes discussed._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
34
A(n)small-sized organization typically spends about 5 percent of the total IT budget on information security._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
35
Effective training and awareness programs make employees accountable for their actions.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)medium-sized organization typically spends about 20 percent of the total IT budget on information security.________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
37
In large organizations,it is recommended to separate information security functions into four areas,including: non-technology business functions,IT functions,information security customer service functions and information security compliance enforcement functions._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
38
An organization's size is the variable that has the greatest influence on the structure of the organization's information security program._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)large-sized organization typically spends about $300 per user on information security._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
40
Training for managers would be more detailed than that for security staff.
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
41
In the on-the-job method of training,a trainer works with each trainee on an individual basis._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
42
A security trinket program is one of the most expensive security awareness programs._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
43
Security education involves providing members of the organization with detailed information and hands-on instruction to enable them to perform their duties securely._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
44
To their advantage,some observers feel that small organizations avoid some threats precisely because of their small size._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
45
The purpose of the CAEIAE program is to enhance security by building in-depth knowledge,by developing security-related skills and knowledge,by improving awareness of the need to protect system resources._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
46
The typical security staff in a small organization consists of ____.

A) one person
B) one to two people
C) one to three people
D) two to five people
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
47
In informing and preparing employees for their role in information security,security awareness provides the "what",training provides the "how" and education provides the "why"._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
48
Managers often resist organized training of any kind._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
49
____ is the term used to describe the structure and organization of the effort that strives to contain the risks to the information assets of the organization.

A) Risk management
B) Security education, training and awareness program
C) Information security program
D) None of these
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
50
The distance learning method of training is in use when a single trainer works with multiple trainees in a formal setting._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
51
Security spending per user and per machine ____ as organizations grow,leaving most handcuffed when it comes to implementing effective security procedures.

A) declines algebraically
B) increases logarithmically
C) declines exponentially
D) increases arithmetically
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
52
An organization's information security Web site should be placed on the Internet._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
53
Security managers are accountable for the day-to-day operation of the information security program._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
54
The Computer Security Act of 1987 requires federal agencies to provide mandatory periodic training in computer security encryption and accepted computer practices to all employees involved with the management,use,or operation of their computer systems._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
55
Individuals who perform routine monitoring activities are called security technicians._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
56
A convenient time to conduct training for general users is during employee orientation._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
57
Security training and awareness activities can be undermined if information security personnel do not set a good example._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following variables is the most influential in determining how to structure an information security program?

A) Security capital budget
B) Organizational size
C) Security personnel budget
D) Organizational culture
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
59
Small organizations spend an average of ____ of their IT budget on security.

A) 5%
B) 11%
C) 20%
D) 24%
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
60
Security awareness and security training are designed to modify any employee behavior that endangers the security of the organization's information._________________________
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
61
A medium-sized organization has ____.

A) a larger security staff than a small organization
B) a larger security budget (as percent of IT budget) than a small organization
C) a smaller security budget (as percent of IT budget) than a large organization
D) larger security needs than a small organization
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following functions needed to implement the information security program identifies the sources of risk and may offer advice on controls that can reduce the risk?

A) Risk management
B) Legal assessment
C) Incident response
D) Risk assessment
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
63
____ are accountable for the day-to-day operation of the information security program.

A) Security administrators
B) Security managers
C) Security technicians
D) Security analysts
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
64
Large organizations spend an average of ____ of the IT budget on security.

A) 5%
B) 10%
C) 11%
D) 20%
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following would be responsible for configuring firewalls and IDSs,implementing security software,and diagnosing and troubleshooting problems?

A) A security technician
B) A security analyst
C) A security consultant
D) The security manager
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following functions needed to implement the information security program implements and oversees the use of controls to reduce risk?

A) Risk assessment
B) Incident response
C) Risk management
D) Network security administration
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
67
Large organizations tend to spend ____ on security as smaller organizations.

A) substantially less
B) twice as much
C) substantially more
D) about the same
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
68
On average,the security budget of a medium-sized organization is ____ of the total IT budget.

A) 5%
B) 11%
C) 20%
D) 34%
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?

A) Systems testing
B) Risk assessment
C) Incident response
D) Planning
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
70
Researching,creating,maintaining,and promoting information security plans is part of the ____ function needed to implement the information security program.

A) systems testing
B) policy
C) planning
D) systems security administration
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
71
Very large organizations spend an average of ____ of the IT budget on security.

A) 5%
B) 6%
C) 7%
D) 11%
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
72
In large organizations the information security department is often headed by the CISO who reports directly to the ____.

A) VP of Insurance and Risk Management
B) VP of Marketing
C) top computing executive or Chief Information Officer
D) Chief Operations Officer
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
73
Security managers commonly report to the ____.

A) CIO
B) CISO
C) CEO
D) security analyst
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following functions needed to implement the information security program evaluates risk present in IT initiatives and/or systems?

A) Risk management
B) Risk assessment
C) Systems testing
D) Vulnerability assessment
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
75
The ____ may also be called the Manager of Security.

A) CEO
B) CIO
C) CISO
D) Security Watchstander
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
76
The security analyst is a specialized ____.

A) security administrator
B) security technician
C) security manager
D) CISO
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
77
The responsibilities of the ____ are a combination of the responsibilities of a security technician and a security manager.

A) CEO
B) CISO
C) security analyst
D) security administrator
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
78
The ____ is primarily responsible for the assessment,management,and implementation of the program that secures the organization's information.

A) CEO
B) CIO
C) CISO
D) COO
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
79
____ organizations have information security budgets that grow faster than their IT budgets.

A) Small
B) Medium-sized
C) Large
D) Very large
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
80
In ____ organizations,the average amount spent on security per user is less than in any other type of organization.

A) small
B) medium-sized
C) large
D) very large
Unlock Deck
Unlock for access to all 133 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 133 flashcards in this deck.