
The GRC Approach to Managing Cybersecurity
Authored by мадияр алимов
Mathematics
1st Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Вопрос 1
In a manager's interpersonal role they _____.
collect, process, and use information in order to complete cybersecurity objectives
interact with their bosses, employees, co-workers, other organizational stakeholders, and basically anyone involved with or affected by the cybersecurity function
make choices by selecting from among alternatives and they resolve conflicts, dilemmas, or challenges related to cybersecurity
unilaterally direct all employee compter uses in the organization
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2 In a manager's decisional role they _____.
collect, process, and use information in order to complete cybersecurity objectives
interact with their bosses, employees, co-workers, other organizational stakeholders, and basically anyone involved with or affected by the cybersecurity function
make choices by selecting from among alternatives and they resolve conflicts, dilemmas, or challenges related to cybersecurity
unilaterally direct all employee compter uses in the organization
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
3 Controlling is _____.
the activity that focuses on the structuring of resources
the administration of employees, making sure you have the right number of people, as well as the right skills within your staff to do the work
communicating your plans to your employees, and making sure they are working to help achieve the department’s goals
making sure that the department and it’s employees are making progress towards the objectives that you specified during planning and making sure any problems that come up are solved
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
4 Which of these is not one of the three general categories of Cybersecurity policy?
Network Usage Policies (NUPs)
Enterprise policy (EISP or ECSP)
Issue-Specific Security Policies (ISSPs)
System-Specific Policies (SysSPs)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
5 The most common approach used by larger organizations puts the cybersecurity department in the _____ department.
Human Resources
Information Technology
Legal
Internal Audit
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Вопрос 6
In general, the larger the organization is, typically the _____ is spent per employee.
more
less
same amount
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Вопрос 7
Those cybersecurity professional that define cybersecurity are _____
those able to handle planning, policy and risk management
the engineers, programmers and other technical specialists that create security solutions
those that administer or operate cybersecurity
those that are responsible for day-to-day monitoring and operations
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?