1 A security manager is developing a data classification policy . What elements need to be in the policy ?
• 2 An organization employs hundreds of office workers that use computers to perform their tasks . What is the best plan for informing employees about security issues ?
• 3 The statement , “ Information systems should be configured to require strong passwords ”, is an example of a / an :
• 4 The statement , “ Promote professionalism among information system security practitioners through the provisioning of professional certification and training .” is an example of a / an :
• 5 Exposure factor is defined as :
• 6 A security manager needs to perform a risk assessment on a critical business application , in order to determine what additional controls may be needed to protect the application and its databases . The best approach to performing this risk assessment is :
• 7 CIA is known as :
• 8 An organization has a strong , management-driven model of security related activities such as policy , risk management , standards , and processes . This model is better known as :
www . cis502mentor . com
1 A security manager is developing a data classification policy . What elements need to be in the policy ?
• 2 An organization employs hundreds of office workers that use computers to perform their tasks . What is the best plan for informing employees about security issues ?
• 3 The statement , “ Information systems should be configured to require strong passwords ”, is an example of a / an :
• 4 The statement , “ Promote professionalism among information system security practitioners through the provisioning of professional certification and training .” is an example of a / an :
• 5 Exposure factor is defined as :
• 6 A security manager needs to perform a risk assessment on a critical business application , in order to determine what additional controls may be needed to protect the application and its databases . The best approach to performing this risk assessment is :
• 7 CIA is known as :
• 8 An organization has a strong , management-driven model of security related activities such as policy , risk management , standards , and processes . This model is better known as :