Which of the following provides the BEST level of security training for the executives?
Human Resources (HR) would like executives to undergo only two specific security training programs a
year. Which of the following provides the BEST level of security training for the executives? (Select TWO).
The method to provide end users of IT systems and applications with requirements related to acceptable use, pr
The method to provide end users of IT systems and applications with requirements related to acceptable
use, privacy, new threats and trends, and use of social networking is:
Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway
while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered
connection and corporate data is stolen. Which of the following would BEST prevent this from occurring
again?
Which of the following is the BEST reason to provide user awareness and training programs for organizational s
Which of the following is the BEST reason to provide user awareness and training programs for
organizational staff?
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email, but she
is worried about the confidentiality of the information. Which of the following will accomplish this task
securely?
Which of the following type of training would prevent Ann and other employees from becoming victims to such at
Ann a technician received a spear-phishing email asking her to update her personal information by
clicking the link within the body of the email. Which of the following type of training would prevent Ann
and other employees from becoming victims to such attacks?
End-user awareness training for handling sensitive personally identifiable information would include secure st
End-user awareness training for handling sensitive personally identifiable information would include
secure storage and transmission of customer:
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following policies is implemented in order to minimize data loss or theft?
Which of the following policies is implemented in order to minimize data loss or theft?
which of the following are PII?
Used in conjunction, which of the following are PII? (Select TWO).