• 3 An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?
• 4 An organization suffered a virus outbreak when malware was download by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle:
• 5 A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is::
• 6 A qualitative risk assessment is used to identify:
• 7 An employee with a previous criminal history was terminated. The former employee leaked several sensitive documents to the news media. To prevent this, the organizationshould have:
• 8 CIA is known as:
• 9 The options for risk treatment are:
• 10 The statement,“ Information systems should be configured to require strong passwords”, is an example of a / an:
• 11 An organization has a strong, management-driven model of security related activities such as policy, risk
• 3 An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?
• 4 An organization suffered a virus outbreak when malware was download by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle:
• 5 A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is::
• 6 A qualitative risk assessment is used to identify:
• 7 An employee with a previous criminal history was terminated. The former employee leaked several sensitive documents to the news media. To prevent this, the organizationshould have:
• 8 CIA is known as:
• 9 The options for risk treatment are:
• 10 The statement,“ Information systems should be configured to require strong passwords”, is an example of a / an:
• 11 An organization has a strong, management-driven model of security related activities such as policy, risk