employees will have improved job security instituting chances for employees to

Employees will have improved job security instituting

This preview shows page 2 - 4 out of 6 pages.

employees will have improved job security instituting chances for employees to gather new skills, which can foster enhanced job satisfaction employees will be easier to discipline management will have more control over employees 5 points Question 6 1. A(n) ______________________ is a centrally located device that is capable and permitted to extend and connect to distributed services. malware tool inventory assessment agentless central management tool distributed infrastructure 5 points Question 7 1. Which of the following is one of the downsides of a computer-based training (CBT) approach? It can only measure individual knowledge of presented material. It can be flexible to the point of becoming inconsistent. It is difficult to locate space to conduct training. It is far more expensive than instructor-led training. 5 points Question 8
Image of page 2
1. There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is not an automated control? authentication methods log reviews network segmentation data encryption 5 points Question 9 1. The information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies to be executed, they occupy role of ____________________. front-line manager executive management general counsel subject matter expert (SME) 5 points Question 10 1. It is important that partnership exists between the ___________________, which needs to review the standing legislation that governs their business, and the ____________________, which needs to review all recent or significant policy changes. information security team, legal department CISO, legal department legal department, CISO information security team, executive committee 5 points Question 11 1. Depending on staffing availability, the complexity of implementation, backlog, and how many approvals are needed, manual access requests can take weeks or days. Thus, automation can make the process far more efficient and minimize the time required. Which of the following is not
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 6 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture