CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 8

1 A security manager is developing a data classification policy. What elements need to be in the policy?
• 2 An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?
• 3 The statement,“ Information systems should be configured to require strong passwords”, is an example of a / an:
• 4 The statement,“ Promote professionalism among information system security practitioners through the provisioning of professional certification and training.” is an example of a / an:
• 5 Exposure factor is defined as:
• 6 A security manager needs to perform a risk assessment on a critical business application, in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is:
• 7 CIA is known as:
• 8 An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as:

www. cis502mentor. com

1 A security manager is developing a data classification policy. What elements need to be in the policy?

• 2 An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?

• 3 The statement,“ Information systems should be configured to require strong passwords”, is an example of a / an:

• 4 The statement,“ Promote professionalism among information system security practitioners through the provisioning of professional certification and training.” is an example of a / an:

• 5 Exposure factor is defined as:

• 6 A security manager needs to perform a risk assessment on a critical business application, in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is:

• 7 CIA is known as:

• 8 An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as: