CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 12
•
3
The statement, “Information systems should be
configured to require strong passwords”, is an example of a/an:
•
4
The statement, “Promote professionalism among
information system security practitioners through the
provisioning of professional certification and training.” is an
example of a/an:
•
5
Exposure factor is defined as:
•
6
A security manager needs to perform a risk
assessment on a critical business application, in order to
determine what additional controls may be needed to protect the
application and its databases. The best approach to performing
this risk assessment is:
•
•
7
CIA is known as:
8
An organization has a strong, management-driven
model of security related activities such as policy, risk
management, standards, and processes. This model is better
known as: