100% SOLVED ANSWERS.
1 of 48
Term
The security framework is a more detailed version of the security
blueprint.
Select one:
True False
Give this one a try later!
d.
False
EISP
, b.
domains True
Don't know?
2 of 48
Term
_______often function as standards or procedures to be used when
configuring or maintaining systems.
Select one:
a.
ISSPs
b.
SysSPs
c.
ESSPs
d.
EISPs
Give this one a try later!
b. b.
SysSPs domains
b. b.
cold Operational
Don't know?
, 3 of 48
Term
An attack, breach of policy, or other incident always constitutes a
violation of law, requiring notification of law enforcement.
Select one:
True
False
Give this one a try later!
b.
The global information security
a. community had already defined a
strategic justification for a code of practice,
such as the one identified in
ISO/IEC 17799.
True False
Don't know?
4 of 48
Term
Redundancy can be implemented at a number of points throughout
the security architecture, such as in ________
Select one:
a.
All of the above
, b.
proxy servers
c.
access controls
d.
firewalls
Give this one a try later!
a. c.
All of the All of these are BIA stages
above
a. a.
alert roster management
Don't know?
5 of 48
Term
To remain viable, security policies must have a responsible
manager, a schedule of reviews, a
method for making recommendations for reviews, and a policy
issuance and revision date.. _________________________
Select one:
True
False
Give this one a try later!