Which of the following liabilities is a third-party liability in which an individual may be responsible for an action by another party?
Correct : D
Start a Discussions
Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?
Correct : A
Start a Discussions
Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?
Correct : C
Start a Discussions
Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?
Correct : D
Start a Discussions
Fill in the blank with an appropriate word. _________ are used in information security to formalize security policies.
Correct : A
Start a Discussions