Search Header Logo

The GRC Approach to Managing Cybersecurity

Authored by мадияр алимов

Mathematics

1st Grade

Used 6+ times

The GRC Approach to Managing Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Вопрос 1

In a manager's interpersonal role they _____.

collect, process, and use information in order to complete cybersecurity objectives

interact with their bosses, employees, co-workers, other organizational stakeholders, and basically anyone involved with or affected by the cybersecurity function

make choices by selecting from among alternatives and they resolve conflicts, dilemmas, or challenges related to cybersecurity

unilaterally direct all employee compter uses in the organization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2 In a manager's decisional role they _____.

collect, process, and use information in order to complete cybersecurity objectives

interact with their bosses, employees, co-workers, other organizational stakeholders, and basically anyone involved with or affected by the cybersecurity function

make choices by selecting from among alternatives and they resolve conflicts, dilemmas, or challenges related to cybersecurity

unilaterally direct all employee compter uses in the organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3 Controlling is _____.

the activity that focuses on the structuring of resources

the administration of employees, making sure you have the right number of people, as well as the right skills within your staff to do the work

communicating your plans to your employees, and making sure they are working to help achieve the department’s goals

making sure that the department and it’s employees are making progress towards the objectives that you specified during planning and making sure any problems that come up are solved

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4 Which of these is not one of the three general categories of Cybersecurity policy?

Network Usage Policies (NUPs)

Enterprise policy (EISP or ECSP)

Issue-Specific Security Policies (ISSPs)

System-Specific Policies (SysSPs)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5 The most common approach used by larger organizations puts the cybersecurity department in the _____ department.

Human Resources

Information Technology

Legal

Internal Audit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Вопрос 6

In general, the larger the organization is, typically the _____ is spent per employee.

more

less

same amount

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Вопрос 7

Those cybersecurity professional that define cybersecurity are _____

those able to handle planning, policy and risk management

the engineers, programmers and other technical specialists that create security solutions

those that administer or operate cybersecurity

those that are responsible for day-to-day monitoring and operations

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?