Discuss, Learn and be Happy דיון בשאלות

help brightness_4 brightness_7 format_textdirection_r_to_l format_textdirection_l_to_r

What is an example of Data in Motion?

1
done
by
מיין לפי

Full interruption is a type of

1
done
by
מיין לפי

HSM and SAN are types of

1
done
by
מיין לפי

What types of backups there are?

1
done
by
מיין לפי

In addition to protecting important assets, security rules and procedures should

1
done
Information security rules and procedures should not exist for their own sake — they are put in place to protect important assets and, thereby, support the overall organizational mission. All of the answers are good, but the best answer is c . It brings into focus additional requirements beyond those mentioned in the other answers. The other answers are really subsets of the “protecting important assets” as listed in the question.
by
מיין לפי

Masquerading is

1
done
by
מיין לפי

Integrity is protection of data from all of the following EXCEPT

1
done
Integrity is the protection of system information or processes from intentional or accidental unauthorized changes. Data analysis would usually be associated with confidentiality.
by
מיין לפי

A security program cannot address which of the following business goals?

1
sentiment_very_satisfied
The security program cannot improve the accuracy of data that is put into the system by users, but it can help ensure that any changes are intended and correctly applied.
by
מיין לפי

In most cases, integrity is enforced through

1
done
Integrity depends on access controls; therefore, it is necessary to positively and uniquely identify and authorize all persons who attempt access.
by
מיין לפי

6. A “well-formed transaction” is one that

1
sentiment_very_satisfied
Well-formed transactions must ensure that data can be manipulated only by a specific set of programs.
by
מיין לפי