CPP 2022 Domain 1 Security Principles and Practices Flashcards

1
Q

What is Enterprise Security Risk Management (ESRM)?

A

ESRM is a strategic approach to security management that ties an organization’s security practice to its overall strategy using globally accepted and established risk management principles.
Source: POA, Security Management, 1.1.2, page 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three primary components of ESRM?

A

The context,The foundation,The ESRM cycle.

Source: POA, Security Management, 1.2, page 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This component of ESRM includes organizational aspects that security professionals must understand to successfully adopt ESRM.

A

The context.

Source: POA, Security Management, 1.2, page 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This component of ESRM includes organizational concepts that support the ESRM approach and maximize its impact.

A

The foundation.

Source: POA, Security Management, 1.2, page 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This component of ESRM is the actual process of security risk management that emphasizes the importance of understanding assets.

A

The ESRM cycle.

Source: POA, Security Management, 1.2, page 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What organizational aspects are included in the context of ESRM?

A

Mission and vision, Core values, Operating Environment, Stakeholders.

Source: POA, Security Management, 1.2.1, pages 6-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What three things comprise the operating environment of an organization?

A

Physical, Non physical, Logical.

Source: POA, Security Management, 1.2.1, page 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This operating environment includes much of what influences traditional security factors, such as the type and location of buildings, industrial control systems, and products on hand.

A

Physical.

Source: POA, Security Management, 1.2.1, page 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These factors are sources of risk, and include things such as the geopolitical environment, intensity of competition, and speed required for decision making.

A

Non physical factors.

Source: POA, Security Management, 1.2.1, page 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These factors focus on information types such as servers, workstations, and network infrastructure.

A

Logical factors.

Source: POA, Security Management, 1.2.1, page 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four processes in the ESRM cycle?

A

Identify and prioritize assets, Identify and prioritize risks, Mitigate prioritized risks, Continuous improvement.

Source: POA, Security Management, 1.2.2, page 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an asset owner?

A

The person most directly responsible for successful operation of the asset. In ESRM, the asset owner is assigned responsibility for the risk to an asset.

Source: POA, Security Management, 1.2.2, page 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What four concepts comprise the foundation of ESRM?

A

Holistic risk management, Partnership with stakeholders, Transparency, Governance.
Source: POA, Security Management, 1.2.3, page 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two types of assets?

A

Tangible, Intangible.

Source: POA, Security Management, 2.1.1, page 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are four ways to manage risk?

A

Eliminate, Reduce, Transfer, Accept.

Source: POA, Security Management, 2.2.1, page 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This risk mitigation strategy involves removing the risk entirely.

A

Eliminate.

Source: POA, Security Management, 2.2.1, page 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This risk mitigation strategy attempts to minimize risk through protective measures.

A

Reduce.

Source: POA, Security Management, 2.2.1, page 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This risk mitigation strategy is typically achieved when another entity takes the risk on the organization’s behalf.

A

Transfer.

Source: POA, Security Management, 2.2.1, page 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This risk mitigation strategy allows risk if the costs of reducing, eliminating, or transferring the risk outweigh the potential losses associated with it.

A

Accept.

Source: POA, Security Management, 2.2.1, page 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a risk assessment?

A

Risk assessment is the identification, analysis, and evaluation of uncertainties to objectives and outcomes.  It provides a comparison between the desired/undesired outcomes and expected rewards/losses of organizational objectives. The risk assessment analyzes whether the uncertainty is within acceptable boundaries and within the organization’s capacity to manage risk.

Source: Risk Assessment Standard, 0.2, page xvi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do the results of a risk assessment inform?

A

The choices available to effectively manage risk to achieve the organization’s outcomes.

Source: Risk Assessment Standard, 0.2, page xvi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the deciding factors between a qualitative or quantitative approach to a risk assessment?

A

The reliability and validity of the available data, The nature of the risk factors and if they are quantifiable, The target audience for the outputs.

Source: Risk Assessment Standard, 0.3, page xvii

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is risk appetite?

A

The total exposed amount that an organization wishes to undertake on the basis of risk-return trade-offs for one of more desired and expected outcomes.

Source: Risk Assessment Standard, 3.41, page 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What tasks take place at the start of the risk assessment?

A

Setting objectives, Identification of stakeholders, Identification of internal context and variables, documenting assumptions, Defining scope and statement of work, Policy and management commitment, Commitment of resources.

Source: Risk Assessment Standard, 6.2, pages 40-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a gap analysis?

A

A technique to determine what steps might need to be taken to improve from a current state to a desired, future state.

Source: Risk Assessment Standard, 6.3.1, page 45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A gap analysis consists of what three steps?

A

Noting currently available factors, listing success factors needed to achieve future, desired objectives, Highlighting the gaps that exist and what gaps may need to be filled to be successful.

Source: Risk Assessment Standard, 6.3.1, page 46

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What four components should be in any risk identification process, regardless of risk discipline?

A

Asset and service identification, valuation, and characterization, Threat and opportunity analysis, Vulnerability and capability analysis, Criticality and impact analysis.

Source: Risk Assessment Standard, 6.4.4.1, page 60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is risk tolerance?

A

The amount of uncertainty an organization is prepared to accept in total or more narrowly within a certain business unity, a particular risk category, or for a specific initiative.

Source: Risk Assessment Standard, 3.51, page 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What comprises assessor competence?

A

Personal traits and interpersonal skills, Assessment skills, Communication skills, Education, training, and knowledge, Work experience.

Source: Risk Assessment Standard, 7.1, page 82

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Documented criteria of an assessor’s knowledge and skills provide the basis for what three things?

A

Selection of assessment team members, ascertain competence enhancement required for continuous improvement, Determine performance indicators for assessors.

Source: Risk Assessment Standard, 7.2.2, page 83

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are two types of interactions between a risk assessment team and an organization?

A

Human interaction, Minimal human interactions.

Source: Risk Assessment Standard, A.2, page 88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This type of interaction includes activities such as conducting interviews, document reviews with stakeholders, exercises, and undercover investigations.

A

Human interaction.

Source: Risk Assessment Standard, A.2, page 88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This type of interaction includes activities such as conducting a document review, physical examination, observation, and sampling.

A

Minimal human interaction.

Source: Risk Assessment Standard, A.2, pages 88-89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are two examples of assessment paths?

A

Tracing, Process method.

Source: Risk Assessment Standard, A.3, page 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

This assessment path tracks a process or risk event chronologically, following a path forward or backward through a process or sequence.

A

Tracing.

Source: Risk Assessment Standard, A.3, page 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

This assessment path tests a sequence of steps and evaluates process controls, interactions, effectiveness, and opportunities for improvement.

A

Process method.

Source: Risk Assessment Standard, A.3, page 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are some examples of the process method?

A

Objectives method, Risk source method, Department method, Requirement method, Discovery method.

Source: Risk Assessment Standard, A.3, page 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is sampling?

A

The process or technique of selecting a representative part of a population for the purpose.

Source: Risk Assessment Standard, A.4.1, page 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When is it beneficial to use a sampling method?

A

When it is not practical in time or cost terms to evaluate all available information.

Source: Risk Assessment Standard, A.4.1, page 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are two types of sampling methods?

A

Non-statistical, Statistical.

Source: Risk Assessment Standard, A.4.2, page 91

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This sampling method includes judgmental sampling, convenience sampling, and haphazard sampling.

A

Non-statistical.

Source: Risk Assessment Standard, A.4.3, page 91

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

This sampling method includes random sampling, systematic sampling, stratified sampling, and cluster/block sampling.

A

Statistical sampling.

Source: Risk Assessment Standard, A.4.2, pages 91-92

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is terrorism?

A

An act of violence designed to achieve a political end.

Source: POA, Security Management, 12.3.1, page 195

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is domestic terrorism?

A

Violent, criminal acts committed by individuals and/or groups to further ideological goals stemming from domestic influences, such as those of a political, religious, social, racial, or environmental nature.

Source: POA, Security Management, 12.3.1, page 196

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the primary attack vector of terrorism?

A

To target the public’s sense of security in the location that they reside or work.

Source: POA, Security Management, 12.3.2, page 196

46
Q

What is a cost-benefit analysis?

A

A method for evaluating and comparing the value and cost of risk treatment options.

Source: Risk Assessment Standard, 6.4.4.4, page 77

47
Q

A cost-benefit analysis should consider what two types of costs and benefits?

A

Direct, Indirect.

Source: Risk Assessment Standard, 6.4.4.4, page 77

48
Q

What are examples of direct and indirect benefits?

A

Direct benefits - arising from reduction in the likelihood or harmful consequences of the risk. Indirect benefits - arising from collateral effects of the treatment such as reduced insurance premiums, improved management and staff confidence, and enhanced reputation.

Source: Risk Assessment Standard, 6.4.4.4, page 77

49
Q

What are some examples of direct and indirect costs?

A

Direct costs - of implementing the proposed treatment and/or that could arise if the risk eventuates. Indirect costs - arising from the loss of productivity, business disruption, diversion of management attention, loss of reputation or brand value.

Source: Risk Assessment Standard, 6.4.4.4, page 77

50
Q

What are the goals of risk treatments?

A

Remove the risk source, where possible; Remove or reduce the likelihood of the risk event occurring; Remove or reduce the negative consequences; Share the risk with other parties; Accept risk through informed decision or to exploit an opportunity; Avoid activities that give rise to risk.

Source: Risk Assessment Standard, 6.4.4.5, pages 77-78

51
Q

What is the purpose of a prevention and mitigation procedure?

A

Define the measures to be taken by the organization to minimize the likelihood of a disruptive event or to minimize the potential for the severity of the consequence of the event.

Source: ORM Standard, C.2, page 92

52
Q

What are prevention procedures?

A

Prevention procedures describe how the organization will take proactive steps to protect its assets by establishing architectural, administrative, design, operational, and technological approaches to avoid, eliminate, or reduce the likelihood of risks materializing.

Source: ORM Standard, C.2, page 92

53
Q

What are mitigation procedures?

A

Mitigation procedures describe how the organization will take proactive steps to protect its assets by establishing immediate, interim, and long-term approaches to reduce the consequences of risks before they materialize.

Source: ORM Standard, C.2, page 92

54
Q

What four steps are included in the risk assessment process?

A

Asset identification, valuation, and characterization,Risk identification,Risk analysis, Risk evaluation.

Source: ORM Standard, 7.2.3, page 18

55
Q

What happens in the asset identification, valuation and characterization step of the risk assessment process?

A

Identify people, assets and services that provide tangible and intangible value giving consideration to financial, operational, temporal, and reputational characteristics of assets, activities, functions and services.

Source: ORM Standard, 7.2.3, page 18

56
Q

What happens in the risk identification step of the risk assessment process?

A

Identify sources of strategic, operational, tactical, and reputational risk to assess threats and opportunities; vulnerabilities and capabilities; and consequence and criticalities that have a potential for direct or indirect consequences on the organization’s activities, assets, operations, functions and impacted stakeholders.

Source: ORM Standard, 7.2.3, page 18

57
Q

What happens in the risk analysis step of the risk assessment process?

A

Systematically analyze risk to determine those risks that have significant impact on activities, functions, services, products, supply chain, subcontractors, stakeholder relationships, local populations and the environment.

Source: ORM Standard, 7.2.3, page 18

58
Q

What happens in the risk evaluation step of the risk assessment process?

A

Systematically evaluate and prioritize risk controls and treatments, and their related costs to determine how to bring risk within an acceptable level consistent with risk criteria.

Source: ORM Standard, 7.2.3, page 18

59
Q

What are some outputs of a risk assessment?

A

A prioritized risk register identifying treatments to manage risk,Justification for risk acceptance,Identification of critical control points, Requirements for supplier, distributor, outsourcing and subcontractor controls.

Source: ORM Standard, 7.2.3, page 19

60
Q

What six things should be considered when assessing consequences?

A

Human cost,Financial cost,Image cost, Human rights impacts, Indirect impacts, Environmental impacts.

Source: ORM Standard, A.7.3, page 52

61
Q

What changes may prompt an update to a risk assessment?

A

Changes in: Risk landscape,Leadership and partnerships, Contractual and industry trends, Regulatory requirements, Political environment, Conditions due to an event, Performance based test/exercise results.

Source: ORM Standard, A.7.3, pages 53-54

62
Q

What are five benefits of liaison?

A

Leverage the resources of others,Share best practices and lessons learned,Collaborate on specific cases or incidents, More effectively address common issues, Share information, equipment, and facilities.

Source: POA, Security Management, 9.8.1, page 152

63
Q

What is cost-effectiveness?

A

Producing good results for the money spent.

Source: POA, Security Management, 4.2, page 49

64
Q

What three things maximize cost-effectiveness?

A

Ensure that the operations are conducted in the least expensive but cost effective way,Maintain the lowest costs consistent with required operational results,Ensure that the amount of money spent generates the highest return.

Source: POA, Security Management, 4.2, pages 49-50

65
Q

What is security awareness?

A

Consciousness of an existing security program, its relevance, and the effect of one’s behavior on reducing security risks.

Source: POA, Security Management, 10.7, page 174

66
Q

What is the purpose of a security awareness program?

A

To communicate to all individuals, including those working on behalf of the organization, risks within the organization’s unique internal and external environments, and the technical and administrative controls implemented to effectively manage those risks.

Source: Security Awareness Standard, 4.0, page 3

67
Q

When is an effective security culture established?

A

When people’s behaviors align with the defined risk management processes and where the security technologies and methods deployed are policy based and well communicated through security awareness and training activities.

Source: Security Awareness Standard, 4.0, pages 3-4

68
Q

What is the goal of a security awareness program?

A

To promote compliance with security policies and procedures, as well as provide timely communications and training to guide individual and organizational attitudes and behaviors.

Source: Security Awareness Standard, 4.1, page 4

69
Q

What should every awareness program be structured to reflect?

A

The organization’s unique culture, risk environment, lifecycle management, and change control process.

Source: Security Awareness Standard, 4.1, page 4

70
Q

How does clear top management support for security awareness set the tone?

A

By actively supporting awareness communication, training, and associated activities. Top management should also be involved in strengthening the culture that ensures individuals understand their security roles and take ownership of their personal safety and security.

Source: Security Awareness Standard, 4.2, page 5

71
Q

What three program principles should be established for security awareness programs?

A

Encourage enterprisewide ownership,Develop a unified approach for security awareness communication and training,Leverage existing programs/infrastructure.

Source: Security Awareness Standard, 4.3, page 5

72
Q

What can be done to encourage enterprisewide ownership of security awareness programs?

A

Establishing an oversight, advisory, or steering group comprised of security stakeholders to influence/generate program content and to help communicate risk appetite, strategy, and content relevance.Establishing security champions or influencers to solicit and provide input to program content.

Source: Security Awareness Standard, 4.3.1, page 6

73
Q

What is a benefit of a unified, holistic approach to security awareness program content?

A

Using ‘one voice’ simplifies the message and increases the impact to stakeholders and the organization.

Source: Security Awareness Standard, 4.3.2, page 6

74
Q

What types of benefits may be realized by leveraging existing organizational programs for security awareness?

A

Timing, Resource,Budget, Logistical.

Source: Security Awareness Standard, 4.3.3, page 6

75
Q

What six factors are planning considerations when designing an effective security awareness program?

A

Security policies and procedures,Internal and external considerations,Security risks, Resources, Roles, responsibility, and authorities, Human resources context.

Source: Security Awareness Standard, 5.2, pages 6-9

76
Q

Effective security policies contain what important characteristics?

A

Protecting individuals and organizational assets from security risks;Organizational relevance and maintaining compliance with legal, regulatory, and contractual obligations are clearly explained;Measurements for continual improvement metrics; Content is written to help build an engaged and alert security community; Instructions should help individuals reflect on the policy, consider how to respond in a situation, and take risk-based, informed, and appropriate action; Policy cross-references.

Source: Security Awareness Standard, 5.2.1, page 7

77
Q

Which department plays a pivotal role as collaborator with security personnel in an organization’s security awareness program?

A

Human resources.

Source: Security Awareness Standard, 5.2.6, page 9

78
Q

Security awareness program content should align with what three things?

A

Program goals and objectives,Security policies and procedures,Key performance indicators..

Source: Security Awareness Standard, 6.2, pages 10-11

79
Q

What factors should be considered when determining how security awareness program content should be delivered?

A

Location-specific needs and requirements,Existing training culture and processes to be leveraged,Training topics needed, Types of training formats available and relevant, Levels of training required based on security access or employment status.

Source: Security Awareness Standard, 6.4, page 12

80
Q

What should be included in a security awareness program evaluation?

A

Appropriateness of program goals and objectives,Consistency with the organization’s security policies and procedures,Volume and frequency of security awareness and training content, Effectiveness of content and delivery methods, Level of resources allocated to the program.

Source: Security Awareness Standard, 8, page 14

81
Q

What should security awareness program improvements be based on?

A

Individual feedback,Program evaluations,Evolving threat landscapes, Changes in the organization’s culture, Audit findings, New or changes to legal, regulatory, or contractual obligations, Top management input and direction.

Source: Security Awareness Standard, 9, page 14

82
Q

What are some benefits of using a security consultant?

A

They do not promote or sell a specific product,Objectivity,Out-of-the-box thinking, Can be less expensive than hiring additional staff.

Source: POA, Personnel, 4.1, pages 143-144

83
Q

What are three categories of security consultants?

A

Security management consultants,Technical security consultants,Security forensic consultants.

Source: POA, Personnel, 4.2, page 144

84
Q

This type of security consultant usually specializes in a certain discipline, which comprises the foundation of their expertise.

A

Security management consultants.

Source: POA, Personnel, 4.2.1, page 144

85
Q

This type of security consultant has specialized subject matter expertise and specializes in translating security concepts and functionality into blueprints and equipment specifications.

A

Technical security consultant.

Source: POA, Personnel, 4.2.2, pages 145-146

86
Q

This type of security consultant deals with investigation, identification and collection of evidence, identification of vulnerabilities, mitigation strategies, and litigation.

A

Forensic security consultants.

Source: POA, Personnel, 4.2.3, page 146

87
Q

In what situation are technical security consultants likely to be used?

A

New construction or renovation projects.

Source: POA, Personnel, 4.2.2, page 146

88
Q

What are three ways technical security consultants can support construction and renovation projects?

A

Work with the architects and design engineers to ensure the needed security systems are integrated into the initial designs,Uncover security concerns in the plans before they are finalized,Recommend security hardware and software that is compatible with other building systems.

Source: POA, Personnel, 4.2.2, page 146

89
Q

What is a security advisory committee?

A

An internal resources formed to assist corporate executives and chief security officers in their efforts to ensure that current security measures are adequate.

Source: POA, Personnel, 4.2.4, page 147

90
Q

Who should serve on a security advisory committee?

A

Representatives of key corporate functions with stature and credibility within the organization and sufficient information about the company’s operation to enable them to offer useful opinions about actions that should be taken.

Source: POA, Personnel, 4.2.4, page 147

91
Q

What typically drives the decision to use a security consultant?

A

A specific problem, need, challenge, or goal.,

Source:POA Personnel, 4.3, page 148

92
Q

What are five steps to use when selecting a security consultant?

A

Identify candidates,Invite candidates to submit an application,Evaluate the application, Interview the top two or three candidates, Negotiate an agreement and finalize the selection.

Source: POA, Personnel, 4.5, page 150

93
Q

How can consultant candidates be identified?

A

Suggestions from colleagues and peers,Industry associations,Online.

Source: POA, Personnel, 4.5, page 150

94
Q

What three things should be submitted by prospective security consultants looking to be hired for a project?

A

Custom application,Resume,Proof of license, in jurisdictions with this requirement.

Source: POA, Personnel, 4.5, page 150

95
Q

How can consultant applications be evaluated?

A

Compare the quality of documents and candidates’ credentials,References from prior clients,Background investigations of top candidates.

Source: POA, Personnel, 4.5, pages 150-151

96
Q

What types of questions should be asked during a consultant interview?

A

Questions that probe the candidate’s security philosophy.

Source: POA, Personnel, 4.5, page 151

97
Q

What subjects should be negotiated with a security consultant prior to hiring?

A

Scope of work,Product to be delivered,Methodology, Timing, Related expenses.

Source: POA, Personnel, 4.5, page 151

98
Q

What are five types of fee structures for consultants?

A

Hourly fees,Daily fees,Fixed fees, Not-to-exceed fees, Retainers.

Source: POA, Personnel, 4.6, page 152

99
Q

When is paying a consultant an hourly fee applicable?

A

When the assignment is expected to last less than a day, but the exact amount of time needed is unclear.

Source: POA, Personnel, 4.6.1, page 153

100
Q

When are fixed fee structures used with consultants?

A

When the number of days required to accomplish the work can be estimated accurately and controlled by the consultant.

Source: POA, Personnel, 4.6.3, page 153

101
Q

What is a not-to-exceed fee?

A

The consultant’s guarantee that the total cost or time will be limited to the parameters agreed to in the contract.

Source: POA, Personnel, 4.6.4, page 154

102
Q

What is a consultant retainer agreement?

A

The consultant agrees to work a specified number of days each year for the client, and the client is guaranteed access to the consultant when needed.

Source: POA, Personnel, 4.6.5, page 154

103
Q

What should be covered during a consultant’s organizational orientation?

A

Backgrounds and responsibilities of key personnel,Organizational chart,Operating environment, Key assets and functions, Internal and external relationships relevant to the project, Specific legislative or regulatory controls, History of the enterprise, Philosophy of top management, Competitive position.

Source: POA, Personnel, 4.7.2, page 157

104
Q

What should be outlined in a consultant’s work plan?

A

Scope,Tasks and priorities,Assignments, Completion schedules.

Source: POA, Personnel, 4.7.5, page 159

105
Q

What should be included in a consultant’s final report?

A

Executive summary,Results achieved,Recommendations.

Source: POA, Personnel, 4.7.7, page 160

106
Q

How should the recommendations section of the consultant’s final report be structured?

A

The recommendations should be numbered for future reference and should define any additional work that needs to be done, together with suggestions on how to accomplish it.

Source: POA, Personnel, 4.7.7, page 160

107
Q

What is a chief security officer?

A

A senior executive level function responsible for providing comprehensive integrated risk strategies to help protect an organization from a wide spectrum of threats.

Source: CSO Standard, Annex B, page 13

108
Q

What seven categories of skills is required by a chief security officer?

A

Relationship leader,Executive management and leadership,Subject matter expertise, Governance team member, Risk executive, Strategist, Creative problem solver.

Source: CSO Standard, Table 2, page 5

109
Q

Why is it recommended that the chief security officer report to a key senior-level executive?

A

To ensure a strong liaison with designated leadership bodies.

Source: SO Standard, 4, page 2

110
Q

A chief security officer is expected to have what level of education?

A

Advanced education and degrees should be highly valued.

Source: CSO Standard, 8, page 9