The steps that are taken in the training process itself are prescribed in the ____.

A. evaluation plan
B. assessment plan
C. training plan
D. awareness plan

Answer: C

Computer Science & Information Technology

You might also like to view...

A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?

A. The user’s account was over-privileged. B. Improper error handling triggered a false negative in all three controls. C. The email originated from a private email server with no malware protection. D. The virus was a zero-day attack.

Computer Science & Information Technology

Settings in the Computer Configuration node of Administrative Templates will impact which registry key below?

A. HKEY_LOCAL_MACHINE B. HKEY_LOCAL_USER C. HKEY_CURRENT_MACHINE D. HKEY_CURRENT_USER

Computer Science & Information Technology