True or False? Security control mappings align security controls with related policies.
Category: Uncategorized
True or False? Regarding Federal Information Security Manage…
True or False? Regarding Federal Information Security Management Act (FISMA), certification and accreditation is a process that occurs after a system is documented, controls tested, and risk assessment completed.
In recent years, __________ has emerged as a major technolog…
In recent years, __________ has emerged as a major technology. It provides a way of buying software, infrastructure, and platform services on someone else’s network.
True or False? One of the ways to verify a computer’s identi…
True or False? One of the ways to verify a computer’s identity is by using certificates.
True or False? Leasing private lines for wide area networks…
True or False? Leasing private lines for wide area networks (WANs) is typically less expensive than using virtual private network (VPN) tunnels.
Many organizations have a(n) __________ policy in place that…
Many organizations have a(n) __________ policy in place that addresses rules of conduct for logging in to networks, computers, and applications. This policy covers credentials like IDs and passwords.
The term “intellectual property” (IP) is applied broadly to…
The term “intellectual property” (IP) is applied broadly to any company information that is thought to bring an advantage. Protecting IP through security policies starts with human resources. Which of the following is a challenge concerning human resources (HR) policies about IP?
True or False? Regarding privacy, full disclosure is the ide…
True or False? Regarding privacy, full disclosure is the idea that an individual should know what information is being collected.
A(n) __________ sets expectations on the use and security of…
A(n) __________ sets expectations on the use and security of mobile devices, whereas a(n) __________ establishes a broad set of rules for approved conduct when a user accesses information on company-owned devices.
In order to convince an organization to adopt security polic…
In order to convince an organization to adopt security policies, it is necessary for a manager to have some proficiency in __________, which refers to certain social personality traits such as the ability to communicate and project optimism.