IT Security and Access Control
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The security policy is unique to your company, devised in context of your changing business and ______ needs.

security

Organization of information ______ addresses threats and risks within the corporate network.

security

Asset Management component covers organizational assets within and beyond the corporate ______ network.

IT

Human resource ______ pertains to your personnel, activities, and human errors.

<p>security</p> Signup and view all the answers

Systems must be operated with respect and maintenance to ______ policies and controls.

<p>security</p> Signup and view all the answers

[Blank] management is foundational to information security as well as nearly every other ITSM function.

<p>Configuration</p> Signup and view all the answers

Physical and ______ security guidelines cover security measures to protect physical IT hardware.

<p>environmental</p> Signup and view all the answers

Communications and ______ management systems must be operated with respect and maintenance.

<p>operations</p> Signup and view all the answers

COBIT framework spends significant time on how ______ management and configuration management are foundational to information security.

<p>asset</p> Signup and view all the answers

Policies and controls pertaining to your personnel, activities, and human errors, including measures to reduce risk from ______ threats.

<p>insider</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser