100%(16)16 out of 16 people found this document helpful
This preview shows page 8 - 11 out of 15 pages.
Question 262 out of 2 pointsA __________________________ is a term that refers to the original image thatis duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance.Question 272 out of 2 pointsThere have been a number of attacks on government systems that have been the result of fundamental errors. Correct configurations of these systems would have prevented these attacks, so security experts created the solution in the form of the ___________________________.
Question 282 out of 2 pointsOne of the methods that an organization can use to determine complianceis to perform _______________.Question 292 out of 2 pointsOf the many tools that can be used in training to connect with an audience of employees, _______________ can inspire a sense of fun that leads to community and commitment.Question 302 out of 2 pointsIn order to build security policy implementation awareness across the organization, there should be ____________________ who partner with other team and departments to promote IT security through different communication channels.Question 312 out of 2 points
The department responsible for providing security training to new employees is the _______________.Question 322 out of 2 pointsTraining that happens in a classroom has many benefits, but which of the following is the one of the most significant drawbacks concerning the instructors’ abilities?Question 332 out of 2 pointsA(n) ______________________ is a centrally located device that is capable and permitted to extend and connect to distributed services.Question 342 out of 2 pointsWhich of the following is notone the consequences of having an unmotivated employee?