Co m plia n ce pa sse d 2025 n e w u pda te
Libe r ty Un ive r sity
An organization’s is a good source for determining what
should be in security policies to meet regulatory requirements.
chief information officer
(CIO) privacy officer
chief information security officer (CISO)
human resources manager
Question 2
pts
To be compliant with the security standards and processes outlined in NIST
publications, policies must include key security control requirements. Which
of the following is not one of the key requirements?
inventory
data privacy
categorize by risk level
security controls
Question 3
pts
In order to be compliant with Payment Card Industry Data Security
Standard (PCI DSS), one of the control objectives that should be included in
one’s security policies and controls is building and maintaining a secure
network. The reason for this is as follows:
to require monitoring access to cardholder and periodic penetration
testing of the network
to specify how to maintain secure systems and applications, including the
, required use of antivirus software
to require that security policies reflect the PCI DSS requirements, and that
these policies are kept current and an awareness program is implemented