Which of the following CBK domains covers developing and implementing security policies?
A. Information security governance and risk management
B. Business continuity and disaster recovery planning
C. Legal regulations, investigations, and compliance
D. Security architecture and design
Answer: A
Explanation: The Information security governance and risk management domain includes creating policies and procedures for protecting data, including developing and implementing security policies and managing the information life cycle.
You might also like to view...
If an expression is complex, you can use ____ to indicate which operation should be performed first.
A. quotation marks B. parentheses C. brackets D. wildcard characters
The ____ selector is used to select all of the elements on the Web page.
A. universal B. class C. id D. element
Answer the following statement(s) true (T) or false (F)
1. The Patch Tool is the same as a copy-and-paste mechanism. 2. Like the Healing Brush Tool, the Patch Tool matches the texture, shading, and lighting of the pixels. 3. The Patch Tool can sample pixels from the same image, but not from different images. 4. Using multiple repair techniques creates better results. 5. The amount of red eye emerging from the pupil is determined by the number of the blood vessels in the eye.
?_____ is a model that asks the traditional fact-finding questions in a systems development context.
A. ?A functional decomposition diagram B. ?A class diagram C. ?The Unified Modeling Language D. ?The Zachman Framework for Enterprise Architecture