11 on average the security budget of a medium sized

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
11% On average, the security budget of a medium-sized organization is ____ of the total IT budget. False Individuals who perform routine monitoring activities are called security technicians. one person The typical security staff in a small organization consists of ____. poster Keys to a good security ____________________ series include varying the content and keeping posters updated. On-the-job training Which of the following training methods uses a sink-or-swim approach? security administrator The responsibilities of the ____ are a combination of the responsibilities of a security technician and a security manager. top computing executive or Chief Information Officer In large organizations the information security department is often headed by the CISO who reports directly to the ____. technology product Advanced technical training can be selected or developed based on job category, job function, or ____. definers A study of information security positions found that positions can be classified into one of three types: ____________________ provide the policies, guidelines, and standards. They're the people who do the consulting and the risk assessment, who develop the product and technical architectures.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
builders A study of information security positions found that positions can be classified into one of three types: ____________________ are the real technical types, who create and install security solutions. True Effective training and awareness programs make employees accountable for their actions. False According to Charles Cresson Wood, "Reporting directly to top management is not advisable for the Information Security Department Manager [or CISO] because it impedes objectivity and the ability to perceive what's truly in the best interest of the organization as a whole, rather than what's in the best interest of a particular department." False Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern