Understanding how to develop and implement security policies and standards is a key area of which of the following CBK domain?
A. Information security governance and risk management
B. Security architecture and design
C. Business continuity and disaster recovery planning
D. Operations security
Answer: A
Explanation: Developing and implementing security policies are key activities covered in the information security governance and risk management CBK domain.
You might also like to view...
Which protocol is responsible for discovering network devices on the network, such as computers and routers?
A. IPv4 B. Link-Layer Topology Discovery Mapper I/O Driver C. IPv6 D. Link-Layer Topology Discovery Responder
Dynamic HTML uses ____________________ to define choices ranging from line height to margin width to font face.
a. cascading style sheets b. font mapping c. font substitution d. software robots e. encapsulated PostScript
Danny Watny had a great idea for integrating his organization’s shipment execution system with their Web site. He needed the Information Systems department to start a systems investigation so he filled out a(n) ____.
a. Gantt chart b. systems request form c. planning form d. systems analysis report
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically, or was it general and you were the unfortunate victim?
What will be an ideal response?