CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 12

• 3 The statement, “Information systems should be configured to require strong passwords”, is an example of a/an: • 4 The statement, “Promote professionalism among information system security practitioners through the provisioning of professional certification and training.” is an example of a/an: • 5 Exposure factor is defined as: • 6 A security manager needs to perform a risk assessment on a critical business application, in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is: • • 7 CIA is known as: 8 An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as: