CIS 462 Course Great Wisdom / tutorialrank.com CIS 462 Course Great Wisdom / tutorialrank.com | Page 20

• Question 35 Which of the following documents describes core control requirements for framework policies ?
• Question 36 A PKI uses public and private ______ for the secure exchange of information .
• Question 37 When classifying documents in a business , the data owner must strike a balance between protection and _____________.
• Question 38 Which U . S . military data classification refers to data that the unauthorized disclosure of which would reasonably be expected to cause serious damage to national security ?
• Question 39 In a business classification scheme , which classification refers to routine communications within the organization ?
• Question 40 Before a BCP can be completed , a ( n ) _________ must first be completed and agreed upon by all the key departments within the organization .