100%(25)25 out of 25 people found this document helpful
This preview shows page 6 - 9 out of 15 pages.
Question 202 out of 2 pointsOne of the processes designed to eradicate maximum possible security risks is to ________________, which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals.Question 212 out of 2 pointsSecurity policies that clarify and explain how rights are assigned and approved among employees can ensure that people have only the access needed for their jobs. Which of the following is notaccomplished when prior access is removed?
Question 222 out of 2 pointsDomain security control requirements are embodied in several different types of documents. One such document is known as _______________________, which uses a hierarchical organizing structure to identify the key terms and their explanations.Question 232 out of 2 pointsIn general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships.Question 242 out of 2 pointsOrganizations seek to create a coherent set of documents that are stable and immune to the need for regularly adjustments. However, the types of policy documents can differ, depending on the organization. Which of the following is notone the reasons why these documents might vary from oneorganization to the next?Question 252 out of 2 pointsWhich of the following statements is most accurate with respect to infrastructure security,