97%(155)151 out of 155 people found this document helpful
This preview shows page 9 - 12 out of 15 pages.
Question 31 2 out of 2 pointsA(n) ______________________ is a centrally located device that is capable and permitted to extend and connect to distributed services. Question 32 2 out of 2 pointsIn order to build security policy implementation awareness across the organization, there should be ____________________ who partner with other team and departments to promote IT security through differentcommunication channels.
Question 33 2 out of 2 pointsOf the many tools that can be used in training to connect with an audience of employees, _______________ can inspire a sense of fun that leads to community and commitment. Question 34 0 out of 2 pointsWhich of the following is notone the consequences of having an unmotivated employee? Question 35 2 out of 2 pointsWhich of the following is notone of the outcomes of a wide acceptance of security awareness among employees? Question 36 2 out of 2 points
Training that happens in a classroom has many benefits, but which of the following is the one of the most significant drawbacks concerning the instructors’ abilities? Question 37 2 out of 2 pointsConsider this scenario: After many years, an employee is promoted to a position that has an elevated level of trust with his management. He started with the company in an entry-level position, and then moved from a supervisory to a managerial role. This role entails that the employee trains other employees and has a deep understanding of how the department functions. Which of the following actions should be taken in regard to this employee’s levels of access during the span of time he has worked for the company?