Course Hero Logo

Question 11 4 4 pts there are many barriers to policy

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 5 - 9 out of 13 pages.

Question 114 / 4 pts
There are many barriers to policy acceptance and enforcement. Which of thefollowing is notone the challenges to policy acceptance?
Question 124 / 4 ptsWhich of the following is not one of the “five pillars of the IA model”
Question 134 / 4 pts___________________________are formal written policies describing employeebehavior when using company computer and network systems.
Nondisclosure agreementsConfidentiality agreementsAcceptable use policiesQuestion 144 / 4 ptsPrivacy regulations involve two importantprinciples._____________________gives the consumer an understanding ofwhat and how data is collected and used.________________________provides astandard for handling consumer information.Business liability, Legal obligationAcceptable use policies, Data encryptionFull disclosure, Legal obligationFull disclosure, Data encryption
Question 154 / 4 ptsThere are a number of classifications that can be applied to security controls.Which of the following is notone the classifications?
administrative controlpreventive controltechnical controlQuestion 164 / 4 ptsIn 2013 the national retailer Target Corporation suffered a major data breachthat put at risk the financial information of an estimated 40 millioncustomers. In 2009, the health care provider BlueCross BlueShield ofTennessee suffered a theft of hard drives when it reported 57 hard drivesstolen. Both these cases resulted from a (n) ________________ failure.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 13 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Boyer
Tags
Computer Security, policy principles

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture