When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.
A. baselining
B. best practices
C. benchmarking
D. standards of due care
Answer: D
You might also like to view...
What name is given to the Windows Phone 8.1 virtual assistant?
A. Spartan B. John C. Cortana D. Chief
Your company is merging with another company that operates in several other countries. Which of the following security issues is MOST likely to be effected by the differences in legal or regulatory requirements?
A. software coding practices B. expectation of privacy policy C. network access controls D. disaster recovery procedures
What type of files might lose essential network activity records if power is terminated without a proper shutdown?
a. Password logs b. Word logs c. Io.sys files d. Event logs
When you select a row, you must also select the end of row mark for the row to be selected.
Answer the following statement true (T) or false (F)