Q: 11
The starting point for pre-employment screening is the:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Which type of threat is most frequently overlooked and the most difficult to evaluate regarding
information assets protection?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
The two key elements in any contingency plan are:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
The first task of a security practitioner in a security risk assessment is to develop an understanding of
the:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Which of the following executive protection goals is the top priority?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Protection-in-depth is the strategy of:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
The most effective way to maintain acceptable levels of vigilance is to:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
In the process of conducting a security survey or security audit, meaningful factual objective work
consists of measuring results against:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following is the proper term for an organization's financial commitment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
The first step in the "general security risk assessment flow chart" is to:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2