Your organization needs to implement an organizational security policy. You are reviewing the security standards from different international bodies. Which rule should apply when using these standards?
A. Implement the standards exactly as stipulated by the international body.
B. Submit formal change requests for the standards when they do not meet the needs of your organization.
C. Customize the standards to fit the needs of your organization.
D. Only apply the standards of a single international body.
C
Explanation: You should customize the standards to fit the needs of your organization.
You might also like to view...
The specifications of the ADT sorted list do not mention the case in whichtwo or more items have the same value. Are these specifications sufficient to cover this case,or must they be revised?
What will be an ideal response?
Data integrity is important because computers and people use information to make decisions and take actions.
Answer the following statement true (T) or false (F)
You can create a new appointment directly in the calendar by typing it in a blank time slot in the ________ area.
a. appointment b. scheduling c. task d. calendar
______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.
Fill in the blank(s) with the appropriate word(s).