100%(25)25 out of 25 people found this document helpful
This preview shows page 10 - 13 out of 15 pages.
Question 350 out of 2 pointsWhich of the following scenarios illustrates an ideal time to implement security policies in order to gain the maximum level of organizational commitment?Question 362 out of 2 pointsWhich of the following is notone of the outcomes of a wide acceptance of security awareness among employees?
Question 372 out of 2 pointsOf all the needs that an organization might have to classify data, there are three that are most prevalent. Which of the following is notone of the reasons?Question 382 out of 2 pointsA risk exposure is defined as the impact to the organization when a situation transpires. The widely accepted formula for calculating exposure is as follows: Risk exposure =________________ the event will occur + ____________ if the event occursQuestion 390 out of 2 pointsWhich of the following outcomes is one of the benefits of a risk-management approach to security policies?Question 402 out of 2 pointsWhile it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many
different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is notone these approaches?Question 412 out of 2 pointsConsider this scenario: A major software company finds that code has beenexecuted on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?