=================================================== CIS 349 Final Exam Guide Set 2 FOR MORE CLASSES VISIT www . cis349rank . com
20 ) Which of the following is primarily a corrective control in the Remote Access Domain ?
21 ) The most common control for protecting data privacy in untrusted environments is encryption . There are three main strategies for encrypting data to send to remote users . One strategy does not require any application intervention or changes at all . The connection with the remote user handles the encryption . The most common way to implement system connection encryption is by setting up a secure virtual private network ( VPN ). This is :
22 ) An important step in securing applications is to remove the _____________.
23 ) Security controls in the System / Application Domain generally fall other strategies to protect the organization from data or functionality loss .
24 ) Which of the following is true of a hot site ?
25 ) What name is given to an IIA certification that tests audit knowledge unique to the public sector ?
=================================================== CIS 349 Final Exam Guide Set 2 FOR MORE CLASSES VISIT www . cis349rank . com
CIS 349 Final Exam Guide Set 2