CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 15
•
7
An employee with a previous criminal history
was terminated. The former employee leaked several sensitive
documents to the news media. To prevent this, the organization
should have:
•
•
8 CIA is known as:
9 The options for risk treatment are:
•
10 The statement, “Information systems should be
configured to require strong passwords”, is an example of a/an:
•
11 An organization has a strong, management-driven
model of security related activities such as policy, risk
management, standards, and processes. This model is better
known as:
•
12 An organization wishes to purchase an application,
and is undergoing a formal procurement process to evaluate and
select a product. What documentation should the organization
use to make sure that the application selected has the appropriate
security-related characteristics?
• 13
The statement, “Promote professionalism among
information system security practitioners through the
provisioning of professional certification and training.” is an
example of a/an:
• 14One disadvantage of the use of digital certificates as a
means for two-factor authentication is NOT: