When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.

A. baselining
B. best practices
C. benchmarking
D. standards of due care


Answer: D

Computer Science & Information Technology

You might also like to view...

What name is given to the Windows Phone 8.1 virtual assistant?

A. Spartan B. John C. Cortana D. Chief

Computer Science & Information Technology

Your company is merging with another company that operates in several other countries. Which of the following security issues is MOST likely to be effected by the differences in legal or regulatory requirements?

A. software coding practices B. expectation of privacy policy C. network access controls D. disaster recovery procedures

Computer Science & Information Technology

What type of files might lose essential network activity records if power is terminated without a proper shutdown?

a. Password logs b. Word logs c. Io.sys files d. Event logs

Computer Science & Information Technology

When you select a row, you must also select the end of row mark for the row to be selected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology