In order to build a coalition, it’s the responsibility of th…

In order to build a coalition, it’s the responsibility of the information security officer (ISO) to reach out to stakeholders, explain the policy change, and listen to concerns. Many organizations have what are called control partners, who give input before a policy change can be made. Which of the following is not an example of control partners found in many large organizations?

In a hierarchical organization, there are a large number of…

In a hierarchical organization, there are a large number of touch points and personalities that must be engaged to successfully implement a security policy. As the number of touch points increases, the number of complex __________ also increases between stakeholders.

Remote access is a concern because the person is coming from…

Remote access is a concern because the person is coming from a public network. For stronger security, many organizations require two-factor authentication for remote access. Which of the following is not one of the commonly accepted types of authentication credentials?

Successful security policy implementation in the workplace d…

Successful security policy implementation in the workplace depends on people understanding key concepts and embracing the material. Thus, people need to be motivated to succeed if they are going to implement such policies. Which of the following sources of motivation is generally not recommended?