The Remote Access Domain of a typical IT infrastructure allows __________ to access the ________ network.
Blog
True or False? FERPA applies to all education institutions a…
True or False? FERPA applies to all education institutions and agencies that receive funding under any program administered by the U.S. Department of Education.
What characteristic is common to risk assessments and threat…
What characteristic is common to risk assessments and threat assessments?
True or False? One method of handling malware is to remove i…
True or False? One method of handling malware is to remove it from the infected system.
Which key planning principle guides the development of a bus…
Which key planning principle guides the development of a business continuity plan (BCP)?
True or False? Criticality is usually documented in the busi…
True or False? Criticality is usually documented in the business impact analysis (BIA) but is repeated in the business continuity plan (BCP) for the sake of clarity.
True or False? An external vulnerability assessment is calle…
True or False? An external vulnerability assessment is called “external” because it is performed outside the perimeter of the organization.
The National Institute of Standards and Technology (NIST) pu…
The National Institute of Standards and Technology (NIST) publishes SP 800-53. This document describes a variety of IT security controls, such as access control, incident response, and configuration management. Controls are grouped into families. Which NIST control family helps an organization recover from failures and disasters?
What are critical resources?
What are critical resources?
What step of a business continuity plan (BCP) comes after pr…
What step of a business continuity plan (BCP) comes after providing training?