Drew determines that the cost of buying anti-spyware for technician laptops exceeds the loss expectancy if spy
Drew determines that the cost of buying anti-spyware for technician laptops exceeds the loss expectancy if spyware threats were to happen. Drew should _____ the risk.
What type of document is Amy reading?
Amy reads a document from her workstation:
1.Access the Aspen Bridge by telnet.
2.Enter into privileged mode.
3.Execute command 6 and press Enter.
4.Load the config file.
5.Hit Run.
What type of document is Amy reading?
What principle does this policy support?
Russ is reading the companys information security policy as part of his new employee orientation. One section explains that controls must be in place to guarantee reliability and stability within the company network and that all devices are always accessible. What principle does this policy support?
Security awareness training programs have all of the following characteristics except:
Security awareness training programs have all of the following characteristics except:
What phase of this social engineering attack is Bob involved in?
Bob is a hacker who intends to use social engineering strategies to infiltrate a former employer. After doing thorough research, he begins calling the customer service line to find the weakest representatives to attack. He calls over and over again trying to talk to many different representatives. What phase of this social engineering attack is Bob involved in?
which of the following?
When Mitchell arrives at work on Monday, there is an e-mail in his inbox that reads "All employees should attend phone training in the main conference room before using their newly installed digital phones." This message is an example of which of the following?
Which of the following is a directive issued by senior management that identifies goals, measurements, and res
Which of the following is a directive issued by senior management that identifies goals, measurements, and responsibilities?
Which of the following roles is McKenna performing?
McKenna performs the following data tasks: 1) Assigns data classification levels to meet her business units specific needs. 2) Determines what users can access data. 3) Verifies security controls are in place and working correctly. Which of the following roles is McKenna performing?
who would be the best choice to sponsor a data classification program?
Establishing data classification levels within a company is essential as part of an overall security program. Of the people listed below, who would be the best choice to sponsor a data classification program?
Which of the following should she mark as intangible?
Shirley is in charge of asset identification and classification as part of a risk assessment initiative. In going through an inventory list, she must decide if an asset is tangible or intangible. Which of the following should she mark as intangible?
