One the challenges that can arise in the context of explaining a target state

One the challenges that can arise in the context of

This preview shows page 13 - 17 out of 24 pages.

QUESTION 30One the challenges that can arise in the context of explaining a target state is the issue of coping with outdated technology. Because this type of technology is by definition not likely to conform to the established best practices, there is only one option: it must be replaced. TrueFalse 3 points QUESTION 31
Image of page 13
Many organizations have a(n) ________, which is comprised of end user devices (including tablets, laptops, and smartphones) on a shared network and that use distributed system software; this enables these devices to function simultaneously, regardless of location. 3 points QUESTION 32Following an outage or disruption of services, consult the BCP for a blueprint for establishing the continuity of business operations. 3 points QUESTION 33An occurrence that transgresses an organization’s security policies is known as an incident. Which of the following is not an example of a security incident?
Image of page 14
3 points QUESTION 34While it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is not one these approaches? Classify only the data that is most vital and contains the highest risk to the organization.Classify data by point of origin or storage location.Classify data at use or time of inception.Classify all forms of data no matter the risk to the organization. 3 points QUESTION 35A security token is either a software code or hardware device that produces a “token” during the logon stage. Often represented as a series of numbers, a security token is nearly impossible to duplicate and serves to ensure the identity of the person seeking access to the network.
Image of page 15
3 points QUESTION 36Though organizational challenges to security policy implementation vary depending on the culture and industry, the main hurdle has to do with a lack of sufficient budget to support implementation. 3 points
Image of page 16
Image of page 17

You've reached the end of your free preview.

Want to read all 24 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture