97%(155)151 out of 155 people found this document helpful
This preview shows page 7 - 10 out of 15 pages.
Question 24 2 out of 2 pointsIn policies regarding the ___________ of data, it must be guaranteed that the data that exits the private networkis secured and monitored; the data should also be encrypted while in transit. Question 25 2 out of 2 pointsIf a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.
Question 26 2 out of 2 pointsA ______________________ is an apparatus for risk management that enables the organization to comprehendits risks and how those risks might impact the business. Question 27 2 out of 2 pointsAt Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? Question 28 0 out of 2 pointsConsider this scenario: A major software company finds that code has been executed on an infected machine inits operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach? Question 29
2 out of 2 pointsWhile it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is notone these approaches? Question 30 2 out of 2 pointsWhile there are many ways that policy objectives and goals can be described, some techniques are more effective than others for persuading an organization to implement them. Which of the following is notone of the effective techniques for persuading people to follow policy objectives and goals?