CSIT 161 || A+ Verified Solutions.
Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information. correct answers True Software manufacturers limit their liability when selling software using which of the following correct answers End-User License Agreement (EULA) The __________ tenet of information systems security is concerned with the recovery time objective. correct answers Availability If you are a publicly traded company or U.S. federal government agency, what should you do? correct answers You must go public and announce that you have had a data breach and must inform the impacted individuals of that data breach. Organizations that require customer service representatives to access private customer data can best protect customer privacy and make it easy to access other customer data by using which of the following security controls? correct answers Blocking out customer private data details and allowing access only to the last four digits of Social Security numbers or account numbers The __________ is the weakest link in an IT infrastructure. correct answers User Domain Which of the following security controls can help mitigate malicious email attachments? correct answers Email filtering and quarantining Email attachment antivirus scanning Verifying with users that email source is reputable Holding all inbound emails with unknown attachments You can help ensure confidentiality by implementing __________. correct answers A virtual private network for remote access What is needed if you are sending confidential information within an email message through the public Internet. correct answers Encrypting email communications What helps organizations decrease risks and threats? correct answers Using security policies, standards, procedures, and guidelines A data classification standard is usually part of which policy definition? correct answers Asset protection policy Maximizing availability primarily involves minimizing __________. correct answers The amount of downtime recovering from a disaster The mean time to repair a system or application Downtime by implementing a business continuity plan The recovery time objective
Escuela, estudio y materia
- Institución
- CSIT 161
- Grado
- CSIT 161
Información del documento
- Subido en
- 1 de agosto de 2024
- Número de páginas
- 12
- Escrito en
- 2024/2025
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
information security is specific to securing infor
Documento también disponible en un lote