100%(3)3 out of 3 people found this document helpful
This preview shows page 1 - 4 out of 102 pages.
Question 15.00000 out of 5.00000 pointsWhich of the following is notone the consequences of having an unmotivated employee?Question 25.00000 out of 5.00000 pointsThe scope of security awareness training must be customized based on the type of user assigned to each role in an organization. For instance, it isimportant that ________________ receives training in security basic requirement, regulatory and legal requirement, detail policy review, and reporting suspicious activity.Question 35.00000 out of 5.00000 pointsDuring the process of developing a communications plan, it is necessary to ask the question, __________________.Question 45.00000 out of 5.00000 pointsWhen a CISO is seeking executive buy-in for implementing security policies with respect to a target state, the dialogue should make certain toaddress each of the following except:
Correct Answer:the names of the teams members who were consulted to create the policyQuestion 55.00000 out of 5.00000 pointsEven though SNMP is a part of the TCP/IP suite of protocols, it has undergone a series of improvements since its first version. Which of the following is not one of the improvements offered in version 3?Question 65.00000 out of 5.00000 pointsOf the many tools that can be used in training to connect with an audience of employees, _______________ can inspire a sense of fun that leads to community and commitment.Question 75.00000 out of 5.00000 pointsMicrosoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users.Question 85.00000 out of 5.00000 pointsWhich of the following scenarios illustrates an ideal time to implement security policies in order to gain the maximum level of organizational commitment?