through the Internet to reach the intranet. Which technology are you using?
( 9) A policy that addresses the use of personal mobile devices, such as a smartphone, to access an internal business network is an issue of which IT domain?
( 10) After entering your user name and password, you enter a number displayed on a security token to gain access to your company’ s network. Which type of authentication method does the security token represent?
( 11) In the Workstation Domain, ____________ is the best method of reducing the risk of information leakage.
( 12) Authentication and encryption of intranet traffic is a _______ Domain issue.
( 13) __________ is the ability to reasonably ensure conformity and adherence to both internal and external policies, standards, procedures, laws, and regulations.
( 14) What is included in an IT policy framework?