The Family Educational Rights and Privacy Act (FERPA) requires several key elements in a security policy for compliance. Which of the following is a key element that states that schools can share information without permission for legitimate education evaluation reasons as well as for health and safety reasons?
Blog
True or False? To build a frame work for security policies a…
True or False? To build a frame work for security policies and controls, one can use the following approach: (1) document the concepts and principles you will adopt, (2) apply them to security policies and standards, and (3) develop security controls and procedures.
True or False? Of the eight classic personality types in the…
True or False? Of the eight classic personality types in the workplace, Avoiders tend to do what’s asked of them but not much more.
A switch, router, and firewall are most commonly part of whi…
A switch, router, and firewall are most commonly part of which domain of a typical IT infrastructure?
True or False? The Payment Card Industry Data Security Stand…
True or False? The Payment Card Industry Data Security Standard (PCI DSS) is a worldwide information security standard that describes how to protect credit card information.
__________ refers to an attempt to cause fear or major disru…
__________ refers to an attempt to cause fear or major disruptions in a society through hacking computers. Such attacks target government computers, major companies, or key areas of the economy.
Which of the following is an agency that is responsible for…
Which of the following is an agency that is responsible for developing information security standards and procedures that adhere to the Federal Information Security Management Act (FISMA)?
True or False? To move data from an unsecure wide area netwo…
True or False? To move data from an unsecure wide area network (WAN) to a secure local area network (LAN), you begin by segmenting a piece of the LAN into a demilitarized zone (DMZ).
True or False? Security control mappings align security cont…
True or False? Security control mappings align security controls with related policies.
True or False? Regarding Federal Information Security Manage…
True or False? Regarding Federal Information Security Management Act (FISMA), certification and accreditation is a process that occurs after a system is documented, controls tested, and risk assessment completed.