Selected Answer: distributed
infrastructure Correct Answer: distributed infrastructure Question 31 0 out of 2 points The scope of security awareness training must be customized based on the type of user assigned to each role in an organization. For instance, it is important that ________________ receives training in security basic requirement, regulatory and legal requirement, detail policy review, and reporting suspicious activity. Selected Answer: the IT custodians Correct Answer: middle management Question 32 0 out of 2 points Training that happens in a classroom has many benefits, but which of the following is the one of the most significant drawbacks concerning the instructors’ abilities? Selected Answer: Instructors cannot always successfully locate the space to conduct training sessions. Correct Answer: Instructors with sufficient expertise are difficult to find. Question 33 2 out of 2 points __________________ is a term that denotes the way that a policy either diminishes business disruptions or facilitates the business’s success. Selected Answer: Business risk Correct Answer: Business risk Question 34 0 out of 2 points Which of the following is not one the consequences of having an unmotivated employee?
Selected Answer: employees targeted for social engineering pretexts Correct Answer: employees lacking in self-interest Question 35 2 out of 2 points The goal of employee awareness and training is to ensure that individuals are equipped with the tools necessary for the implementation of security policies. Which of the following is one of the other benefits of a successfully enacted training and awareness program? Selected Answer: instituting chances for employees to gather new skills, which can foster enhanced job satisfaction Correct Answer: instituting chances for employees to gather new skills, which can foster enhanced job satisfaction Question 36 2 out of 2 points In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the executives _______________________. Selected Answer: video record a message from one the leaders in a senior role to share with new employees Correct Answer: video record a message from one the leaders in a senior role to share with new employees Question 37 0 out of 2 points In information security, the individual responsible for setting goals for implementing security policies is the _________________. Selected Answer: executive manager Correct Answer: chief information security officer Question 38 2 out of 2 points There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the
following is not an automated control? Selected Answer: log reviews Correct Answer: log reviews Question 39 2 out of 2 points One of the many roles of the security compliance committee is to focus on controls that are widely used across a large population of applications, systems, and operations. These types of controls are known as ___________________.
You've reached the end of your free preview.
Want to read all 15 pages?
- Spring '14