List three of the five standard work functions listed in the EBK for the training and awareness evaluation perspective.

What will be an ideal response?


1. Assess and evaluate the IT security training and awareness program for compliance with corporate policies, regulations, and laws (statutes), and measure program and employee performance against objectives
2. Review IT security training and awareness program materials and recommend improvements
3. Assess the training and awareness program to ensure that it meets not only the organization's stakeholder needs, but that it is effective and covers current IT security issues and legal requirements
4. Ensure that information security personnel are receiving the appropriate level and type of training
5. Collect, analyze, and report performance measures

Computer Science & Information Technology

You might also like to view...

The payment function syntax of the arguments is (________)

Fill in the blank(s) with correct word

Computer Science & Information Technology

____________________ a file marks it for exclusion from several commands, including Put, Get, Synchronize, Check In, and Check Out.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________ is an SQL standard that is an alternative to the ANSI/ISO standard.

a. X/OPEN b. SAA c. FIPS d. ODBC e. All of these are alternatives to the ANSI/ISO standard.

Computer Science & Information Technology

The root element of AndroidManifest.xml is :

1. application 2. manifest 3. activity 4. action

Computer Science & Information Technology