99%(134)132 out of 134 people found this document helpful
This preview shows page 16 - 20 out of 20 pages.
Question 410 out of 2 pointsWhile there are many valid reasons to monitor users’ computer activities, which of the following is an invalid reason?
Question 422 out of 2 pointsThe information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies tobe executed, they occupy role of ____________________.Question 432 out of 2 pointsThere are many roles and responsibilities entailed in the management andidentification of risks and the enforcement of policies related to information security. One such role is ________________, which has the responsibility of enforcing policies at the employee level.Question 440 out of 2 points
A(n) ______________________ is a centrally located device that is capable and permitted to extend and connect to distributed services.Question 450 out of 2 pointsMany organizations have a(n) ________________________, which is comprisedof end user devices (including tablets, laptops, and smartphones) on a shared network and that use distributed system software; this enables these devices to function simultaneously, regardless of location.Question 460 out of 2 pointsThe scope of security awareness training must be customized based on the type of user assigned to each role in an organization. For instance, it isimportant that ________________ receives training in security basic requirement, regulatory and legal requirement, detail policy review, and reporting suspicious activity.
Question 470 out of 2 pointsWhich of the following scenarios illustrates an ideal time to implement security policies in order to gain the maximum level of organizational commitment?Question 480 out of 2 pointsWhich of the following is the most important reason to solicit feedback from people who have completed security awareness training?Question 490 out of 2 pointsA major defense corporation rolls out a campaign to manage persistent threats to its infrastructure. The corporation decides to institute a ___________________ to identify and evaluate the knowledge gaps that can be addressed through additional training for all employees, even administrators and management.
Question 500 out of 2 pointsWhich of the following is one of the downsides of a computer-based training (CBT) approach?Selected Answer:[None Given]