- The decisions of their organization’s leadership
- The activities of their organization
- The online reviews for their organization
- Social media reviews for their competitor’s organization
Q: Which individuals are considered security stakeholders? Select three
answers.
- Risk managers
- Chief Information Security Officers (CISOs)
- Help desk analysts
- Operations Managers
Q: Fill in the blank: Security operations managers are primarily
responsible for helping to identify and safeguard an organization from _____.
- negative social media reviews
- security threats
- equipment failures
- failed tax audits
Q: Which of the following statements best describes the information that
is communicated to stakeholders?
- It is proprietary.
- It is publicly available.
- It is sensitive.
- It is shareable to the entire organization.
Q: Which of the following guidelines can help security analysts improve
stakeholder communications? Select two answers.
- Be precise
- Include as many topics as possible
- Use technical security terms as much as possible
- Avoid unnecessary technical terms
Q: Which potential security challenges should a security analyst
communicate to security stakeholders?
- Lack of employee retention
- Negative social media reviews
- Negative publicity about non-security related issues that has been posted on the internet
- Malicious code detected in logs
Q: Fill in the blank: Creating ____ communications allows a security
stakeholder to view representations of what is being explained using graphs and
charts.
- visual
- audio
- simple
- complex
Q: Why is it important for analysts to use visuals to tell a security
story?
- Visuals can help an analyst determine which tool to use to solve a security challenge.
- Visuals can help an analyst identify which details are most important for different stakeholders.
- Visuals can help an analyst communicate impactful metrics and data.
- Visuals can help an analyst prioritize which incidents need to be escalated with more or less urgency.
Q: Fill in the blank: In the field of security, ______should always be
communicated with care.
- leave requests
- publicly available information
- sensitive information
- nonsensitive information
Q: Stakeholders have many responsibilities, so they might miss an email
or fail to respond promptly. If an analyst needs to reach a stakeholder right
away, what might be a better option for stakeholder communication?
- A follow-up investigation
- An email to the CISO
- A phone call
- A follow-up email to the stakeholder’s supervisor
Q: What is a stakeholder?
- An individual or a group that manages the public relations crisis for an organization
- An individual or a group that has an interest in any decision or activity of an organization
- The security professionals who manage the SOC operations for an organization
- A customer who depends on an organization to protect their sensitive financial and medical data
Q: Fill in the blank: Communications with stakeholders should always be
precise, avoid unnecessary technical terms, and _____.
- have a clear purpose
- have various purposes to maximize time
- tell an elaborate story to ensure your point is made
- include numerous security questions
Q: Fill in the blank: Visual communications to stakeholders can be used
to convey key details in the form of ____.
- graphs and charts
- logs and alerts
- text-filled documents and graphs
- text messages and charts
Q: An analyst finishes an incident review. Next, they want to clearly
communicate meaningful data from their findings. What action can they take to
share this information?
- Ask stakeholders to report their findings
- Use visuals to tell a security story
- Collaborate with the publicity team to develop a communication strategy
- Request that the Chief Technology Officer (CTO) sends a summary email
Q: Fill in the blank: For security purposes, it is important to
communicate sensitive information with _____.
- graphs and charts
- supervision
- a low level of urgency
- care
Q: What term is used to define an individual or a group that has an
interest in the decisions or activities of an organization?
- Audit specialist
- Incident response manager
- Stakeholder
- Decision-making manager
Q: A security operations manager often works directly with a security
analyst as the first line of defense to protect an organization from what
challenges? Select two answers.
- Risks
- Vulnerabilities
- The use of social media on work devices
- A lack of an employee consortium
Q: Fill in the blank: Information that is communicated to ____ is
considered sensitive.
- an organization’s competitors
- the general public
- stakeholders
- employees regarding social events
Q: You are alerted that a malicious actor has gained unauthorized
access to one of your organization’s manufacturing applications. You need to
inform the operations manager as soon as possible. What is the best way to
communicate this information?
- With a corporate-wide email
- With a letter to HR
- With a dashboard visualization
- Clearly, concisely, and quickly
Q: Fill in the blank: Creating ____ communications allows a security
stakeholder to view representations of what is being explained using graphs and
charts.
- complex
- audio
- simple
- visual
Q: You have recently been hired as a security analyst for an
organization. You’ve been asked by a security stakeholder to provide
information on how often the employees from various departments are clicking on
simulated phishing emails. What action can you take to best communicate this
information?
- Use visuals, such as charts and graphs, to tell the security story
- Call the stakeholder and directly update them
- Ask your supervisor to report your findings because you are new
- Send an email that explains the necessary information
Q: What is the best way to follow-up with a stakeholder who has not
immediately responded to your email? Select two answers.
- Send them an instant message
- File a complaint with human resources
- Report the issue to your supervisor
- Call them on the phone