Security & IntelligenceAnswer Key

What Is Not A Goal Of Information Security Awareness Programs

15 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Configuration changes can be made at any time during a system life cycle and no process is required.

ANSWER

False

QUESTION 2

Company-related classifications are not standard, therefore, there may be some differences between the terms "private" and "confidential" in different companies.

ANSWER

True

QUESTION 3

Bob is preparing to dispose of magnetic media and wishes to destroy the data stored on it. Which method is NOT a good approach for destroying data?

ANSWER

Formatting

QUESTION 4

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

ANSWER

Memorandum of understanding (MOU)

QUESTION 5

What is the correct order of steps in the change control process?

ANSWER

Request, impact assessment, approval, build/test, implement, monitor

QUESTION 6

The term "data owner" refers to the person or group that manages an IT infrastructure.

ANSWER

False

QUESTION 7

Policies that cover data management should cover transitions throughout the data life cycle.

ANSWER

True

QUESTION 8

What is NOT a goal of information security awareness programs?

ANSWER

Punish users who violate policy

QUESTION 9

In what software development model does activity progress in a lock-step sequential process where no phase begins until the previous phase is complete?

ANSWER

Waterfall

QUESTION 10

Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems. What type of document should she create?

ANSWER

Baseline

QUESTION 11

Certification is the formal agreement by an authorizing official to accept the risk of implementing a system.

ANSWER

False

QUESTION 12

A hardware configuration chart should NOT include copies of software configurations.

ANSWER

False

QUESTION 13

Roger's organization received a mass email message that attempted to trick users into revealing their passwords by pretending to be a help desk representative. What category of social engineering is this an example of?

ANSWER

Phishing

QUESTION 14

Often an extension of a memorandum of understanding (MOU), the blanket purchase agreement (BPA) serves as an agreement that documents the technical requirements of interconnected assets.

ANSWER

False

QUESTION 15

Mandatory vacations minimize risk by rotating employees among various systems or duties.

ANSWER

False

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials