95%(132)126 out of 132 people found this document helpful
This preview shows page 11 - 15 out of 20 pages.
Question 262 out of 2 pointsA major defense corporation rolls out a campaign to manage persistent threats to its infrastructure. The corporation decides to institute a ___________________ to identify and evaluate the knowledge gaps that can be addressed through additional training for all employees, even administrators and management.Question 270 out of 2 points__________________ is a term that denotes the way that a policy either diminishes business disruptions or facilitates the business’s success.Question 280 out of 2 points
In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the executives _______________________.Question 292 out of 2 pointsWhen a CISO is seeking executive buy-in for implementing security policies with respect to a target state, the dialogue should make certain toaddress each of the following except:Question 302 out of 2 pointsA __________________________ is a term that refers to the original image thatis duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance.Question 31
2 out of 2 pointsThere are a number of automated tools created by Microsoft that can be used to verify compliance. Once such tool is the ____________________, which is a free download that locates system vulnerabilities by sending queries. This tool can scan multiple systems in a network and maintain a history of reports for all prior scans.Question 322 out of 2 pointsA security _____________identifies a group of fundamental configurations designed to accomplish particular security objectives.Question 330 out of 2 pointsIn order to ensure compliance, organizations deploy both new and current technologies. Which of the following is notone these new technologies?