100%(16)16 out of 16 people found this document helpful
This preview shows page 2 - 5 out of 15 pages.
Question 72 out of 2 pointsAfter management has created and agreed upon its policies, it must then determine how these policies will be implemented. Which of the following is not one the processes that line management will follow in order to makethe new policies operational?
Question 82 out of 2 pointsWhich of the following outcomes is one of the benefits of a risk-management approach to security policies?Question 92 out of 2 pointsConsider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result,the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?Question 102 out of 2 pointsWhile it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is notone these approaches?
Question 112 out of 2 pointsWhen constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD),and that there are procedures that verify SOD requirements.Question 122 out of 2 pointsThe term ________________ denotes data that is being stored on devices likea universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term ______________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network.