List the five high-level stipulations built into the procurement implementation process in the EBK.
What will be an ideal response?
1. Include IT security considerations as directed by policies and procedures in procurement and acquisition activities
2. Negotiate final deals (e.g., contracts, contract changes, grants, and agreements) to include
IT security requirements that minimize risk to the organization
3. Ensure that physical security concerns are integrated into acquisition strategies
4. Maintain ongoing and effective communications with suppliers and providers
5. Perform compliance reviews of delivered products and services to assess the delivery of IA requirements against stated contract requirements and measures
You might also like to view...
____ is the trend to blend several technologies with distinct functions into a single product.
A. Digital convergence B. Digital evolution C. Digitization D. Cloud computing
Match the following ways to manage large amounts of e-mail with their function:
I. filter junk e-mail II. presort e-mail III. categorize messages IV. sort messages V. use columns A. define rules to help with organization B. assign names to different colors and then assign e-mails to colors C. display appropriate details to help view useful information D. block unsolicited and unwanted e-mail E. achieve by clicking the heading
The property that is used to specify whether or not an element can have another floating element beside it is the ____________________ property.
Fill in the blank(s) with the appropriate word(s).
The process of inserting an object, such as an Excel chart, into a Word document so that it becomes part of the document
a. Linking b. Recording c. Embedding