Which of the following would be MOST effective in reducing data leaks in this situation?
After a number of highly publicized and embarrassing customer data leaks as a result of social
engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will
reduce the risk of another data leak. Which of the following would be MOST effective in reducing
data leaks in this situation?
which of the following?
Sara, a company’s security officer, often receives reports of unauthorized personnel having
access codes to the cipher locks of secure areas in the building. Sara should immediately
implement which of the following?
Which of the following provides the BEST level of security training for the executives?
Human Resources (HR) would like executives to undergo only two specific security training
programs a year. Which of the following provides the BEST level of security training for the
executives? (Select TWO).
The method to provide end users of IT systems and applications with requirements related to acceptable use, pr
The method to provide end users of IT systems and applications with requirements related to
acceptable use, privacy, new threats and trends, and use of social networking is:
Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring again?
Which of the following is the BEST reason to provide user awareness and training programs for organizational s
Which of the following is the BEST reason to provide user awareness and training programs for
organizational staff?
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email,
but she is worried about the confidentiality of the information. Which of the following will
accomplish this task securely?
Which of the following type of training would prevent Ann and other employees from becoming victims to such at
Ann a technician received a spear-phishing email asking her to update her personal information by
clicking the link within the body of the email. Which of the following type of training would prevent
Ann and other employees from becoming victims to such attacks?
End-user awareness training for handling sensitive personally identifiable information would include secure st
End-user awareness training for handling sensitive personally identifiable information would
include secure storage and transmission of customer:
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following concepts is a term that directly relates to customer privacy considerations?