Which of the following CBK domains covers developing and implementing security policies?

A. Information security governance and risk management
B. Business continuity and disaster recovery planning
C. Legal regulations, investigations, and compliance
D. Security architecture and design


Answer: A
Explanation: The Information security governance and risk management domain includes creating policies and procedures for protecting data, including developing and implementing security policies and managing the information life cycle.

Computer Science & Information Technology

You might also like to view...

If an expression is complex, you can use ____ to indicate which operation should be performed first.

A. quotation marks B. parentheses C. brackets D. wildcard characters

Computer Science & Information Technology

The ____ selector is used to select all of the elements on the Web page.

A. universal B. class C. id D. element

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. The Patch Tool is the same as a copy-and-paste mechanism. 2. Like the Healing Brush Tool, the Patch Tool matches the texture, shading, and lighting of the pixels. 3. The Patch Tool can sample pixels from the same image, but not from different images. 4. Using multiple repair techniques creates better results. 5. The amount of red eye emerging from the pupil is determined by the number of the blood vessels in the eye.

Computer Science & Information Technology

?_____ is a model that asks the traditional fact-finding questions in a systems development context.

A. ?A functional decomposition diagram B. ?A class diagram C. ?The Unified Modeling Language D. ?The Zachman Framework for Enterprise Architecture

Computer Science & Information Technology