Filters
Question type

Study Flashcards

The purpose of SETA is to enhance security in all but which of the following ways?


A) by building in-depth knowledge
B) by adding barriers
C) by developing skills
D) by improving awareness

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

GGG security is commonly used to describe which aspect of security?


A) technical
B) software
C) physical
D) theoretical

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

An organization's information security program refers to theentire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information _______ of the organization.

Correct Answer

verifed

verified

Small organizations spend more per user on security than medium- and large-sized organizations.

A) True
B) False

Correct Answer

verifed

verified

In the early stages of planning,the project planner should attempt to specify completion dates only for major employees within the project._________________________

A) True
B) False

Correct Answer

verifed

verified

List the steps of the seven-step methodology for implementing training.

Correct Answer

verifed

verified

The seven-step methodology for implement...

View Answer

Which function needed to implement the information security program includes researching,creating,maintaining,and promoting information security plans?


A) compliance
B) policy
C) planning
D) systems security administration

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is true about the security staffing,budget,and needs of a medium-sized organization?


A) they have a larger security staff than a small organization
B) they have a larger security budget (as percent of IT budget) than a small organization
C) they have a smaller security budget (as percent of IT budget) than a large organization
D) they have larger information security needs than a small organization

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Advanced technical training can be selected or developed based on which of the following?


A) level of previous education
B) level of previous training
C) technology product
D) number of employees

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a disadvantage of the one-on-one training method?


A) Inflexible
B) May not be responsive to the needs of all the trainees
C) Content may not be customized to the needs of the organization
D) Resource intensive, to the point of being inefficient

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Project ____________________is adescription of a project's features,capabilities,functions,and quality level,used as the basis of a project plan.

Correct Answer

verifed

verified

Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation?


A) policy
B) centralized authentication
C) compliance/audit
D) risk management

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

What is the purpose of a security awareness program?What advantage does an awareness program have for the InfoSec program?

Correct Answer

verifed

verified

A security awareness program keeps InfoS...

View Answer

Which of the following variables is the most influential in determining how to structure an information security program?


A) Security capital budget
B) Organizational size
C) Security personnel budget
D) Organizational culture

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is NOT a step in the process of implementing training?


A) administer the program
B) hire expert consultants
C) motivate management and employees
D) identify target audiences

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 55 of 55

Related Exams

Show Answer