A security auditor is putting together a report for the Chief Executive Officer (CEO) on personnel security and its impact on the security posture of the whole organization. Which of the following would be the MOST important factor to consider when it comes to personnel security?
A. Insider threats
B. Privilege escalation
C. Hacktivist
D. Phishing through social media
E. Corporate espionage
Answer: A. Insider threats
You might also like to view...
Case-Based Critical Thinking QuestionsCase 2-3Helen wants to create a Web site based on her famous cooking show. She would like to provide instructions on how to create some of her favorite dishes. She would like her recipes to be displayed in very simple, step-by-step pages. Helen wants to post information exclusively for the chefs in her restaurants. What type of structure should Helen use for these pages?
A. linear B. mixed C. protected D. hierarchical
We used the final version of the program in section 10.2.2. The following session shows the profile of the resulting program. The diagram below the session is the call graph for the executed program drawn in a pictorial form.
What will be an ideal response?
____ is the act of failing to notify individuals that their data is being collected, or failing to provide a way for individuals to view or correct such data.
A. Insecurity B. Aggregation C. Exposure D. Exclusion
The Calendar constant ____________________ displays the day number of the current year.
Fill in the blank(s) with the appropriate word(s).