1. Describe two techniques to help reduce the insider threat.
2. Give two examples of social engineering attacks.
3. List five types of security policy directives often published by organizations.
4. Briefly summarize the evolution of information security management standards.
5. Summarize the steps in a typical change control process.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here