Users Post author:Devendra Kumar Post published: Post comments:0 Comments 6. Which of the following are actions and/or steps that can be taken to avoid leaks and disclosures when handling sensitive data? Answers Giving the employees the right tools to get their work done without compromising security.Understanding what employees need to do to accomplish their jobs.Giving unrestricted access to the employees handling sensitive dataAllowing employees to write their passwords on a post-it note 7. When evaluating the services of a vendor company, which of the following can be used to assess their security capabilities? Check all that apply. Answers Ask the vendor to complete a questionnaireAssume that they’re using industry-standard solutionsRequest full access to the vendor systems to perform an assessmentAsk them to provide any penetration testing or security assessment reports 8. What is the goal of mandatory IT security training for an organization? Check all that apply. Answers To punish employees with poor security practicesTo educate employees on how to stay secureTo build a culture that prioritizes securityTo avoid the need for a security team 9. Which of the following are necessary in the organization to create a culture that makes security a priority? Select all that apply. Answers Reinforce and reward behaviors that boost the security of the organizationA working environment that encourages people to speak up.Punish employees every time they make poor security practicesDesignated communication channels 10. A long and complex password requirement is designed to protect against _________. Answers lazy usersemployees memory lostbrute force attackspassword reuse Previous Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Week 5 – Data Recovery & Backups Week 2 – All about analytical thinking – Shuffle Q/A 3 Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.