Chapter 3 - U.S. Compliance Laws and Information Security Policy Requirements
- Answers
- BEEDCyberterrorism or cyberwarfareBCIPABBBDD
When creating laws and regulations, the government's sole concern is the privacy of the individual.
| ||
Which of the following are pressures on creating security policies?
| ||
Which of the following laws require proper security controls for handling privacy data?
| ||
Which of the following are control objectives for PCI DSS?
| ||
Nation-state attacks that try to disrupt the country's critical infrastructure are sometimes referred to as ________.
| ||
Health care providers are those that process and facilitate billing.
| ||
The law that attempts to limit children's exposure to sexually explicit material is ________.
| ||
The only consideration in protecting personal customer information is legal requirements.
| ||
You should always write new security policies each time a new regulation is issued.
| ||
What should you ask for to gain confidence that a vendor's security controls are adequate?
| ||
Why is it important to map regulatory requirements to policies and controls?
| ||
Who typically writes a report to the board of directors on the current state of information security within a company?
|
Comments
Post a Comment