93%(107)100 out of 107 people found this document helpful
This preview shows page 9 - 12 out of 12 pages.
QUESTION 291.In the ______________ principle adopted by many organizations, you gainaccess only to the systems and data you need to perform your job.confidentialityIntegritydon’t ask, don’t tellneed to know2.50000 points QUESTION 301.___________________________ are formal written policies describing employee behavior when using company computer and network systems.QUESTION 311.The new class of software available to support policy management andpublication is called Governance, Risk, and Compliance (GRC). Which of the following explanations fits the “governance” category of the software?
2.50000 points QUESTION 321.The concept of _________________ comes from the acknowledgment thatdata changes form and often gets copied, moved, and stored in many places.Sensitive data often leaves the protection of application databases and ends up in e-mails, spreadsheets, and personal workstation files.file transfer protocolpatch managementdata loss protectionsecurity management2.50000 points QUESTION 331.A security awareness program can be implemented in many ways. Which of the following is the list of generally accepted principles for implementing a program?2.50000 points QUESTION 341.Also known as the Federal Information Processing Standards (FIPS), the_______________ framework is a shared set of security standards required by the Federal Information Security Management Act (FISMA).NISTPCI DSSISOCOBIT2.50000 points QUESTION 351.A good example of ___________________ is a real estate business that shares data on new home purchases between the unit that sells insurance for the home and the business unit that sold the home.a replicated operating