1. True or False: The person responsible for the storage, maintenance, and prote
ID: 3661827 • Letter: 1
Question
1. True or False: The person responsible for the storage, maintenance, and protection of the information is the data custodian.
2. Information security has more to do with _______ than with ______.
3. The characteristic of information that deals with preventing disclosure is ________.
4. True or False: Information security programs that begin at a grassroots level by system administrators to improve security are often called a bottom-up approach.
5. True or False: Personal security addresses the issues needed to protect items, objects, or areas.
6. A formal approach to solving a problem based on a structured sequence of procedures is called a(n) ______.
7. _______ security encompasses the protection of an organization's communications media, technology, and content.
8. True or False: Many organizations find that their most valuable asset is their data.
9. A senior executive who promotes an information security project and ensures its support, both financially and administratively, at the highest levels of the organization is called a(n) _______.
10. Which SecSDLC phase keeps the security systems in a high state of readiness? ______
Explanation / Answer
1. True or False: The person responsible for the storage, maintenance, and protection of the
information is the data custodian. True
2. Information security has more to do with _______ than with ______. management, technology
3. The characteristic of information that deals with preventing disclosure is ________. confidentiality
4. True or False: Information security programs that begin at a grassroots level by system
administrators to improve security are often called a bottom-up approach. True
5. True or False: Personal security addresses the issues needed to protect items, objects, or
areas. False
6. A formal approach to solving a problem based on a structured sequence of procedures is
called a(n) ______. SDLC methodology
7. _______ security encompasses the protection of an organization's communications media,
technology, and content. communications security
8. True or False: Many organizations find that their most valuable asset is their data. True
9. A senior executive who promotes an information security project and ensures its support,
both financially and administratively, at the highest levels of the organization is called
a(n) _______. champion
10. Which SecSDLC phase keeps the security systems in a high state of readiness? ______ maintenance and change
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.