List the four functions that the EBK specifies should be inspected regularly to ensure the continuing integrity of the data security controls.

What will be an ideal response?


1. Assess the effectiveness of enterprise data security policies, processes, and procedures against established standards, guidelines, and requirements and suggest changes where appropriate
2. Evaluate the effectiveness of solutions implemented to provide the required protection of data
3. Review alleged violations of data security and privacy breaches
4. Identify improvement actions required to maintain the appropriate level of data protection

Computer Science & Information Technology

You might also like to view...

What is the first step in figuring out the usable range of addresses in a subnet?

A) To calculate the number of subnets that is allowed by the configured mask B) To calculate the subnet address and the broadcast address C) To calculate the subnet multicast address D) To calculate the number of subnets that is allowed by the configured address

Computer Science & Information Technology

All dual core or higher processors and all motherboards sold today support what technology capable of enhancing the processor support for virtual machines?

A. 128-bit processing B. hardware-assisted virtualization C. enhanced multimedia instruction set D. execute disable bit

Computer Science & Information Technology

The ARM puts the program counter in register r15, making it visible to the programmer. Someone writing about the ARM stated that this exposed the ARM’s pipeline. What did he mean, and why? Note: You may have to look at the section on pipelining to answer this.

What will be an ideal response?

Computer Science & Information Technology

The ______________ printing technique is an example of the CMYK method of color printing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology