CIS 462 Course Great Wisdom / tutorialrank.com CIS 462 Course Great Wisdom / tutorialrank.com | Page 20

• Question 35 Which of the following documents describes core control requirements for framework policies?
• Question 36 A PKI uses public and private ______ for the secure exchange of information.
• Question 37 When classifying documents in a business, the data owner must strike a balance between protection and _____________.
• Question 38 Which U. S. military data classification refers to data that the unauthorized disclosure of which would reasonably be expected to cause serious damage to national security?
• Question 39 In a business classification scheme, which classification refers to routine communications within the organization?
• Question 40 Before a BCP can be completed, a( n) _________ must first be completed and agreed upon by all the key departments within the organization.