Match the following security roles on the left with the job descriptions on the right
1. data owner a. implements the information classification and controls after they are determined
2. data custodian b. monitors user activities to ensure that the appropriate controls are in place
3. security analyst c. determines the classification level of the information for which he is responsible
4. auditor d. assesses the security needs of the organization
1-c, 2-a, 3-d, 4-b
You might also like to view...
Like most strategic practice standards, the EBK was created by ____ from the expert community.
A. examining output B. studying plans C. facilitating input D. defining input
The forward slash (/) is used to identify a statement as a comment.
Answer the following statement true (T) or false (F)
The file extensions .wav, .mp3, and .ogg are used for:
a. audio files b. video files c. Flash media files d. none of the above
Be sure to _______________ all audio files so that they will download for the majority of Internet users in a reasonable time and so that they maintain good quality.
Fill in the blank(s) with the appropriate word(s).