Strategic planning is the process of moving the organization towards its ____.
The transfer of large batches of data to an off-site facilit…
The transfer of large batches of data to an off-site facility is called ____.
RAID ____ drives can be hot swapped.
RAID ____ drives can be hot swapped.
A method of encryption that requires the same secret key to…
A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.
Failure to develop an information security system based on t…
Failure to develop an information security system based on the organization’s mission, vision, and culture guarantees the failure of the information security program.
____ is a hybrid cryptosystem that combines some of the best…
____ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.
Common implementations of RA include: systems to issue digit…
Common implementations of RA include: systems to issue digital certificates to users and servers; directory enrollment; key issuing systems; tools for managing the key issuance; and verification and return of certificates.
A(n) ____ plan deals with the identification, classification…
A(n) ____ plan deals with the identification, classification, response, and recovery from an incident.
Secure Electronic Transactions was developed by MasterCard a…
Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to protect against electronic payment fraud.
NNIST Special Publication 800-18 Rev. 1, The Guide for Devel…
NNIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templates for major application security plans.