through the Internet to reach the intranet . Which technology are you using ?
( 9 ) A policy that addresses the use of personal mobile devices , such as a smartphone , to access an internal business network is an issue of which IT domain ?
( 10 ) After entering your user name and password , you enter a number displayed on a security token to gain access to your company ’ s network . Which type of authentication method does the security token represent ?
( 11 ) In the Workstation Domain , ____________ is the best method of reducing the risk of information leakage .
( 12 ) Authentication and encryption of intranet traffic is a _______ Domain issue .
( 13 ) __________ is the ability to reasonably ensure conformity and adherence to both internal and external policies , standards , procedures , laws , and regulations .
( 14 ) What is included in an IT policy framework ?