Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Management of Information Security
Quiz 5: Developing the Security Program
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
Which of the following is NOT a step in the process of implementing training?
Question 102
Short Answer
The ____________________ program is designed to reduce the incidence of accidental security breaches by members of the organization.
Question 103
Short Answer
A study of information security positions found that positions can be classified into one of three types: ____________________ provide the policies,guidelines,and standards.They're the people who do the consulting and the risk assessment,who develop the product and technical architectures.
Question 104
Short Answer
Security spending per user and per machine ____________________ exponentially as organizations grow,leaving most handcuffed when it comes to implementing effective security procedures.
Question 105
Multiple Choice
Which of the following is the first step in the process of implementing training?
Question 106
Short Answer
A study of information security positions found that positions can be classified into one of three types: ____________________ are the real technical types,who create and install security solutions.
Question 107
Short Answer
The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.
Question 108
Multiple Choice
____ shifts responsibility for training onto the trainee,with little formal support.
Question 109
Short Answer
When it comes to the personnel budget,in general,security programs are ____________________ for the tasks they have been assigned.
Question 110
Short Answer
Technically qualified individuals who configure firewalls and IDSs,implement security software,diagnose and troubleshoot problems,and coordinate with systems and network administrators to ensure that security technology is properly implemented are referred to as ____________________.
Question 111
Short Answer
The three elements of a SETA program are security education,security training,and ____________________.
Question 112
Short Answer
____________________ personnel are the front line of incident response,as they may be able to diagnose and recognize an attack while handling calls from users having problems with their computers,the network,or Internet connections.