Question 410 out of 2 points While there are many valid reasons to monitor

Question 410 out of 2 points while there are many

This preview shows page 16 - 20 out of 20 pages.

Question 410 out of 2 pointsWhile there are many valid reasons to monitor users’ computer activities, which of the following is an invalid reason?
Image of page 16
Question 422 out of 2 pointsThe information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies tobe executed, they occupy role of ____________________. Question 432 out of 2 pointsThere are many roles and responsibilities entailed in the management andidentification of risks and the enforcement of policies related to information security. One such role is ________________, which has the responsibility of enforcing policies at the employee level. Question 44 0 out of 2 points
Image of page 17
A(n) ______________________ is a centrally located device that is capable and permitted to extend and connect to distributed services. Question 450 out of 2 pointsMany organizations have a(n) ________________________, which is comprisedof end user devices (including tablets, laptops, and smartphones) on a shared network and that use distributed system software; this enables these devices to function simultaneously, regardless of location. Question 460 out of 2 pointsThe scope of security awareness training must be customized based on the type of user assigned to each role in an organization. For instance, it isimportant that ________________ receives training in security basic requirement, regulatory and legal requirement, detail policy review, and reporting suspicious activity.
Image of page 18
Question 470 out of 2 pointsWhich of the following scenarios illustrates an ideal time to implement security policies in order to gain the maximum level of organizational commitment? Question 480 out of 2 pointsWhich of the following is the most important reason to solicit feedback from people who have completed security awareness training? Question 490 out of 2 pointsA major defense corporation rolls out a campaign to manage persistent threats to its infrastructure. The corporation decides to institute a ___________________ to identify and evaluate the knowledge gaps that can be addressed through additional training for all employees, even administrators and management.
Image of page 19
Question 500 out of 2 pointsWhich of the following is one of the downsides of a computer-based training (CBT) approach? Selected Answer: [None Given]
Image of page 20

You've reached the end of your free preview.

Want to read all 20 pages?

  • Summer '16

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture