What principle does this policy support?
Russ is reading the companys information security policy as part of his new employee orientation. One section explains that controls must be in place to guarantee reliability and stability within the company network and that all devices are always accessible. What principle does this policy support?
Security awareness training programs have all of the following characteristics except:
Security awareness training programs have all of the following characteristics except:
What phase of this social engineering attack is Bob involved in?
Bob is a hacker who intends to use social engineering strategies to infiltrate a former employer. After doing thorough research, he begins calling the customer service line to find the weakest representatives to attack. He calls over and over again trying to talk to many different representatives. What phase of this social engineering attack is Bob involved in?
which of the following?
When Mitchell arrives at work on Monday, there is an e-mail in his inbox that reads "All employees should attend phone training in the main conference room before using their newly installed digital phones." This message is an example of which of the following?
Which of the following is a directive issued by senior management that identifies goals, measurements, and res
Which of the following is a directive issued by senior management that identifies goals, measurements, and responsibilities?
Which of the following roles is McKenna performing?
McKenna performs the following data tasks: 1) Assigns data classification levels to meet her business units specific needs. 2) Determines what users can access data. 3) Verifies security controls are in place and working correctly. Which of the following roles is McKenna performing?
who would be the best choice to sponsor a data classification program?
Establishing data classification levels within a company is essential as part of an overall security program. Of the people listed below, who would be the best choice to sponsor a data classification program?
Which of the following should she mark as intangible?
Shirley is in charge of asset identification and classification as part of a risk assessment initiative. In going through an inventory list, she must decide if an asset is tangible or intangible. Which of the following should she mark as intangible?
Which of the following is true of a qualitative risk analysis approach?
Which of the following is true of a qualitative risk analysis approach?
Risk assessment is not always met with open arms by management for all of the following reasons except:
Risk assessment is not always met with open arms by management for all of the following reasons except: