Page 21 - CPTE_Prep_Guide_Sample
P. 21
4. __________: Identifying which information is
sensitive and evaluating its exposure to social
engineering and breakdowns in security
systems.
a) Event Test Performing
b) Training to Employees
c) Standard Framework
d) Scrutinizing Information
5. __________: Establishing security protocols,
policies, and procedures for handling sensitive
information.
a) Event Test Performing
b) Training to Employees
c) Security Protocols
d) Inoculation
6. __________: Training employees in security
protocols relevant to their position.
a) Event Test Performing
b) Training to Employees
c) Standard Framework
d) Scrutinizing Information
426