CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 22
•
10 The statement, “Information systems should be
configured to require strong passwords”, is an example of a/an:
•
11 An organization has a strong, management-driven
model of security related activities such as policy, risk
management, standards, and processes. This model is better
known as:
•
12 An organization wishes to purchase an application,
and is undergoing a formal procurement process to evaluate and
select a product. What documentation should the organization
use to make sure that the application selected has the appropriate
security-related characteristics?
• 13
The statement, “Promote professionalism among
information system security practitioners through the
provisioning of professional certification and training.” is an
example of a/an:
• 14One disadvantage of the use of digital certificates as a
means for two-factor authentication is NOT:
•
15
The categories of controls are: