98%(221)216 out of 221 people found this document helpful
This preview shows page 6 - 9 out of 19 pages.
Question 172 out of 2 pointsIn information security, the individual responsible for setting goals for implementing security policies is the _________________.Question 180 out of 2 points
___________________ are responsible for the monitoring of activities the pre, middle, and post stages of goal implementation, whereas __________________are responsible for the monitoring of activities following the implementation and are called upon to evaluate whether or not the goals have been achieved.Question 190 out of 2 pointsConsider this scenario: A health insurer in Oklahoma settled a class-action lawsuit after having reported that one laptop was stolen in 2008; this laptop contained personal data of more than 1.6 million customers. Based on the fact that the laptop was not encrypted, and that employees were lacking in security awareness training, which of the following statements captures the root cause of this breach?Question 200 out of 2 pointsIt is important that partnership exists between the ___________________, which needs to review the standing legislation that governs their business, and the ____________________, which needs toreview all recent or significant policy changes.
Question 212 out of 2 pointsOne of the many roles of the security compliance committee is to focus on controls that are widely used across a large population of applications, systems, and operations. These types of controls are known as ___________________.Question 222 out of 2 pointsIn workstation domain policies, _________________ provide the specific technology requirements for each device. IT staff uses recorded and published procedures to enact configurations by devices to ensure that secure connectivity for remote devices exists, as well as virus and malware protection and patch management capability, among several other related functions.