PTS:1REF:13410.What are the four elements that an EISP document should include?
PTS:1REF:129-130Chapter 05 - Developing the Security ProgramTRUE/FALSE1.Small organizations spend more per user on security than medium- and large-sized organizations.
PTS:1REF:1662.Legal assessment for the implementation of the information security programis almost always done by the information security or IT departments.
PTS:1REF:1673.Threats from insiders are more likely in a small organization than in a large one.
PTS:1REF:1714.The security education, training, and awareness (SETA) program is designed to reduce the incidence of external security attacks.