Which of the following provides the BEST level of security training for the executives?
Human Resources (HR) would like executives to undergo only two specific security training
programs a year. Which of the following provides the BEST level of security training for the
executives? (Select TWO).
The method to provide end users of IT systems and applications with requirements related to acceptable use, pr
The method to provide end users of IT systems and applications with requirements related to
acceptable use, privacy, new threats and trends, and use of social networking is:
Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring again?
Which of the following is the BEST reason to provide user awareness and training programs for organizational s
Which of the following is the BEST reason to provide user awareness and training programs for
organizational staff?
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email,
but she is worried about the confidentiality of the information. Which of the following will
accomplish this task securely?
Which of the following type of training would prevent Ann and other employees from becoming victims to such at
Ann a technician received a spear-phishing email asking her to update her personal information by
clicking the link within the body of the email. Which of the following type of training would prevent
Ann and other employees from becoming victims to such attacks?
End-user awareness training for handling sensitive personally identifiable information would include secure st
End-user awareness training for handling sensitive personally identifiable information would
include secure storage and transmission of customer:
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following policies is implemented in order to minimize data loss or theft?
Which of the following policies is implemented in order to minimize data loss or theft?
which of the following are PII?
Used in conjunction, which of the following are PII? (Select TWO).