Reference no: EM132228313
1. One of the interesting things we can observe conducting S.W.O.T. analysis is?
a. Planning almost always works very well
b. A friend in need is a friend indeed
c. "goods" and "bads" often come together
d. None of the above
2. What is the most appropriate definition of S.W.O.T. analysis?
a. An analysis of micro-organizational details
b. An analysis of larger historical factors in economics
c. A study in time management
d. none of the above
3. According to our one of the video lectures, what are the three types of cyber criminals?
A. spies, terrorists, zealots
B. state sponsored, thieves, jihadists
C. hackers, nations, pranksters
D. organized criminals, hacktivists, state-sponsored hackers
4. A password protection policy must have the following EXCEPT:
Separate administration & user passwords
Multi-factor authentication
Account lock-outs
Forced password expiration
5. Within organizations information security planners should be aware that cybersecurity risk is ______________________at every level of a business, but it is __________________in the boardroom and C-Suite.
a. Created, Managed
b. Managed, Owned
c. Executed, Invested
d. Built, Owned