Show
Lesson 5: Public Health SurveillanceSelf-Assessment QuizNow that you have read Lesson 5 and have completed the exercises, you should be ready to take the self-assessment quiz. This quiz is designed to help you assess how well you have learned the content of this lesson. You may refer to the lesson text whenever you are unsure of the answer. Unless instructed otherwise, choose ALL correct answers for each question.
Which of the following is the most important in developing security policies?Which of the following is MOST important in developing a security strategy? Explanation: Alignment with business strategy is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
What is the primary goal of developing an information security program?The primary goal of developing an information security strategy is to: Establish security metrics and performance monitoring.
Which of the following would be the best indicator of effective information security governance within an organization?Which of the following would be the best indicator of effective information security governance within an organization? Answer : The steering committee approves security projects.
Which of the following should be the first step in developing an information security plan?Steps to Create an Information Security Plan:. Step 1: Perform a Regulatory Review and Landscape. Your firm must first perform a regulatory review, as all businesses have requirement coming from oversight bodies. ... . Step 2: Specify Governance, Oversight & Responsibility. ... . Step 3: Take Inventory of Assets.. |