The struggle between how to manage a business versus how to “grow” has significant implications for security policies that must reflect the core values of the business. Which of the following statements reflects one of the security policy approaches often taken by entrepreneurs growing a business?
Blog
True or False? The last step on Kotter’s Eight-Step Change M…
True or False? The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must become habit and part of the culture. Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.
True or False? In the monitoring process, quality assurance…
True or False? In the monitoring process, quality assurance is about sampling work that has already been done to ensure that, collectively, actions meet standards, and quality control is about verifying and approving actions before they occur.
True or False? In a wide area network (WAN), the number of h…
True or False? In a wide area network (WAN), the number of hops refers to the number of routers data has to pass through to get to its destination.
True or False? A flat network limits what and how computers…
True or False? A flat network limits what and how computers are able to talk to each other.
True or False? Of the eight classic personality types in the…
True or False? Of the eight classic personality types in the workplace, Commanders can often appear angry or even hostile toward ideas and others on the team and are critical of others’ ideas.
Which of the following statements captures an example of a m…
Which of the following statements captures an example of a manager tapping into pride as a source of motivation?
True or False? An agent of change in an organization should…
True or False? An agent of change in an organization should be a leader who follows the pack.
True or False? Rather than building rules into security poli…
True or False? Rather than building rules into security policies for each regulation, a best practice is to build in the key control concepts found in many regulations.
In order to build a coalition, it’s the responsibility of th…
In order to build a coalition, it’s the responsibility of the information security officer (ISO) to reach out to stakeholders, explain the policy change, and listen to concerns. Many organizations have what are called control partners, who give input before a policy change can be made. Which of the following is not an example of control partners found in many large organizations?