List four of the common work functions specified in the EBK for the management of network and telecommunications security.
What will be an ideal response?
1. Establish a network and telecommunications security program in line with enterprise goals and policies
2. Manage the necessary resources, including financial resources, to establish and maintain an effective network and telecommunications security program
3. Direct network and telecommunications security personnel
4. Define the scope of the network and telecommunications security program
5. Establish communications between the network and telecommunications security team and related security teams (e.g., technical support, security administration, and incident response)
6. Establish a network and telecommunications performance measurement and monitoring program
7. Ensure enterprise compliance with applicable network-based standards, procedures, directives, policies, regulations, and laws (statutes)
8. Ensure that network-based audits and management reviews are conducted to implement process improvement
9. Ensure that appropriate changes and improvement actions are implemented as required
You might also like to view...
The Analytical Engine was developed by ________
A) Alan Turing B) Charles Babbage C) Ada Lovelace D) Joseph Marie Jacquard
Data type conversions take place across assignment operators.
Answer the following statement true (T) or false (F)
An affidavit is used as permission to search for evidentiary material at a specified location and/or to seize items to return to an investigator's lab for examination after being signed by an approving authority. __________
Answer the following statement true (T) or false (F)
Which of the four is not considered one of the four basic words in SQL statements?
A. SELECT B. WHERE C. FROM D. SORTED