- (Topic 5)
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
Correct Answer:
A
- (Topic 1)
An organization information security policy serves to
Correct Answer:
B
- (Topic 5)
When dealing with risk, the information security practitioner may choose to:
Correct Answer:
C
- (Topic 1)
What is a difference from the list below between quantitative and qualitative Risk Assessment?
Correct Answer:
A
- (Topic 1)
Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:
Correct Answer:
D