Question 1 2 out of 2 pointsThere are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is notan automated control? Question 2 2 out of 2 pointsThere are many roles and responsibilities entailed in the management and identification of risks and the enforcement of policies related to information security. One such role is ________________, which has the responsibility of enforcing policies at the employee level. Question 3 2 out of 2 pointsWhich of the following is the most important reason why data needs to be both retrievable and properly stored? Question 4 0 out of 2 pointsIt is important that partnership exists between the ___________________, which needs to review the standing legislation that governs their business, and the ____________________, which needs to review all recent or significant policy changes.
Question 5 2 out of 2 points What is the main difference between a law and a regulation ? Question 6 0 out of 2 pointsOne of the many roles of the security compliance committee is to focus on controls that are widely used across a large population of applications, systems, and operations. These types of controls are known as ___________________. Question 7 2 out of 2 pointsWhile there are many valid reasons to monitor users’ computer activities, which of the following is an invalid reason? Question 8
2 out of 2 points ___________________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices.
You've reached the end of your free preview.
Want to read all 15 pages?
- Spring '14
- Computer Security, Correct Answer