Both general management and information technology management are responsible for implementing information security.
A. 
True
B. 
False
2.
Information security has more to do with technology than management.
A. 
True
B. 
False
3.
A deliberate act of theft would be:
A. 
Equipment failure
B. 
Piracy or copyright infringement
C. 
Illegal confiscation of equipment or information
4.
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting ________________________.
A. 
Industrial espionage
B. 
Competitive intelligence
C. 
Shoulder surfing
5.
Unlike any other of the information technology programs, the primary mission of an information security program is to ensure that systems and their contents remain the same.
Do you know about user security awareness? To check your knowledge of user information security awareness, take this quiz. In this awareness program, the employees of an organization are educated about cybercrimes and other...
Questions: 20 | Attempts: 17646 | Last updated: Mar 22, 2022
Sample Question
Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?