List three of the eight general capabilities required for IT security professional by the EBK.

What will be an ideal response?


Manage, design, and evaluate data security
Evaluate enterprise continuity programs
Design and evaluate incident management programs
Design, implement, and evaluate IT security training and awareness programs
Design and evaluate personnel security programs
Design and evaluate physical and environmental security programs
Implement regulatory and standards compliance
Design, implement, and evaluate risk management programs

Computer Science & Information Technology

You might also like to view...

Which environments must use SQL Server authentication because Windows authentication cannot be used?

A. Active Directory domains B. Windows-only networks C. Web applications D. multi-domain forests

Computer Science & Information Technology

The Services tab in Task Manager shows all user applications running on the computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The bitwise AND operator & is often used to ________ bits (i.e., to select certain bits from a bit string while zeroing others).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Print All, Pages, and Selected Record(s) are options available from the ____ for printing forms.

A. PRINT PREVIEW tab B. Print dialog box C. PRINT LAYOUT tab D. Print layout options dialog box

Computer Science & Information Technology