Question 262 out of 2 pointsA major defense corporation rolls out a campaign to manage persistent threats to its infrastructure. The corporation decides to institute a ___________________ to identify and evaluate the knowledge gaps that can be addressed through additional training for all employees, even administrators and management. Question 270 out of 2 points__________________ is a term that denotes the way that a policy either diminishes business disruptions or facilitates the business’s success. Question 28 0 out of 2 points
In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the executives _______________________. Question 292 out of 2 pointsWhen a CISO is seeking executive buy-in for implementing security policies with respect to a target state, the dialogue should make certain toaddress each of the following except: Question 302 out of 2 pointsA __________________________ is a term that refers to the original image thatis duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance. Question 31
2 out of 2 points There are a number of automated tools created by Microsoft that can be used to verify compliance. Once such tool is the ____________________, which is a free download that locates system vulnerabilities by sending queries. This tool can scan multiple systems in a network and maintain a history of reports for all prior scans. Question 322 out of 2 pointsA security _____________identifies a group of fundamental configurations designed to accomplish particular security objectives. Question 330 out of 2 pointsIn order to ensure compliance, organizations deploy both new and current technologies. Which of the following is notone these new technologies?
You've reached the end of your free preview.
Want to read all 20 pages?
- Summer '16