Question
Question 11 pts From an organizational standpoint, which of the following is ensured through compliance? Group of answer choices Implementation of secure business practices Adoption
Question 11 pts
From an organizational standpoint, which of the following is ensured through compliance?
Group of answer choices
Implementation of secure business practices
Adoption of a written set of privacy procedures
Elimination of market competition
Execution of contingency plans
Flag this Question
Question 21 pts
The best way to handle the human element in access control is through training and _________.
Group of answer choices
PIA
RFID
Organizational buy-in
Security awareness
Flag this Question
Question 31 pts
The method of organizing sensitive information into various access levels is known as __________.
Group of answer choices
Classification scheme
Automatic declassification
Classification level
Systematic declassification
Flag this Question
Question 41 pts
The security rule is ________ to the privacy rule.
Group of answer choices
similar
neutral
complementary
supplementary
What does the title 21 CFR Part 11 of the Code of Federal Regulations deal with?
Group of answer choices
FDA guidelines on electronic records and digital signatures
Specific mandates for financial reporting
Administrative Simplification provisions
Electronic security guidelines
Flag this Question
Question 61 pts
Which of the following best describes the CFAA?
Group of answer choices
A state law to mandate controls for credit card merchants
A statute for foreign national corporations to implement access controls
An international statute for domestic protection of electronic media
A federal criminal statute to protect electronic data from theft
Flag this Question
Question 71 pts
Which of the following is not a part of the mandates specified by SOX?
Group of answer choices
Enhanced Financial Disclosures
Commission Resources and Authority
Auditor Independence
Administrative Simplification provisions
Flag this Question
Question 81 pts
Which of the following is not a type of security breach?
Group of answer choices
Social engineering
System exploits
Mutualism
Vandalism
Flag this Question
Question 91 pts
Which of the following statements does not hold true for RBAC?
Group of answer choices
It focuses more on the information rather than on the doers actions.
It is becoming popular for commercial applications.
It is an alternative to traditional DAC and MAC policies.
It utilizes individual and group roles as the basis for organizing access.
Flag this Question
Question 101 pts
Corporations classify information to try to keep a competitive advantage over other.
Group of answer choices
True
False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started