56%(36)20 out of 36 people found this document helpful
This preview shows page 3 - 7 out of 11 pages.
QUESTION 91.Integrityensures that only authorized individuals have access to data.TrueFalse2.00000 points QUESTION 101.Availability ensures information is available to authorized users and devices. Initially, the information owner must determine availability requirements. The owner must determine who needs access to the data and when.2.00000 points QUESTION 111.___________________ is the act of protecting information and the systems that store and process it.2.00000 points QUESTION 121.It is important for leaders in information systems security to:
2.00000 points QUESTION 131.Place the Policy Implementation steps in order.Anchor the Changes in Corporate CultureBuild on the ChangeCreate Short-term WinsRemove ObstaclesCreate UrgencyForm a Powerful CoalitionCreate a Vision for Change
Communicate the Vision8.00000 points QUESTION 141.Refer back to question 13. The most difficult and time consuming step of policy implementation is also the last step. What step is that?2.00000 points QUESTION 151.What defines how an organization performs and conducts business functions and transactions with a desired outcome?2.00000 points QUESTION 161.The first step in incident response takes its name from a medical term and is the art of rapidly assessing how severe an incident is. Which is the correct term?
ent2.00000 points QUESTION 171.A firewall can be an example of a technical control.TrueFalse2.00000 points