• 3 An organization employs hundreds of office workers that use computers to perform their tasks . What is the best plan for informing employees about security issues ?
• 4 An organization suffered a virus outbreak when malware was download by an employee in a spam message . This outbreak might not have happened had the organization followed what security principle :
• 5 A security manager is performing a quantitative risk assessment on a particular asset . The security manager wants to estimate the yearly loss based on a particular threat . The correct way to calculate this is ::
• 6 A qualitative risk assessment is used to identify :
• 7 An employee with a previous criminal history was terminated . The former employee leaked several sensitive documents to the news media . To prevent this , the organizationshould have :
• 8 CIA is known as :
• 9 The options for risk treatment are :
• 10 The statement , “ Information systems should be configured to require strong passwords ”, is an example of a / an :
• 11 An organization has a strong , management-driven model of security related activities such as policy , risk
• 3 An organization employs hundreds of office workers that use computers to perform their tasks . What is the best plan for informing employees about security issues ?
• 4 An organization suffered a virus outbreak when malware was download by an employee in a spam message . This outbreak might not have happened had the organization followed what security principle :
• 5 A security manager is performing a quantitative risk assessment on a particular asset . The security manager wants to estimate the yearly loss based on a particular threat . The correct way to calculate this is ::
• 6 A qualitative risk assessment is used to identify :
• 7 An employee with a previous criminal history was terminated . The former employee leaked several sensitive documents to the news media . To prevent this , the organizationshould have :
• 8 CIA is known as :
• 9 The options for risk treatment are :
• 10 The statement , “ Information systems should be configured to require strong passwords ”, is an example of a / an :
• 11 An organization has a strong , management-driven model of security related activities such as policy , risk