You will find the answers to all self-assessment questions in this section.
Information asset security frameworks, standards, and guidelines
- Answer: B. Logical access controls
Explanation: Logical access controls are the most effective way to safeguard critical data within information processing facilities. Logical access controls are technical controls, such as authentication, encryption, firewall, IDS, and so on, which are very difficult to bypass by a layman. The security committee addresses the broader perspective of security. The other options are not as effective as logical access controls. - Answer: B. The information system security policy
Explanation: Logical access controls are designed and developed on the basis of the approved information system security policy of the organization. The user requirements and industry practices should be considered when developing a security policy. However, the implementation of logical controls should be done in accordance with...