Читать книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple - Страница 71

Written Lab

Оглавление

1 Discuss and describe the CIA Triad.

2 What are the requirements to hold a person accountable for the actions of their user account?

3 Name the six primary security roles as defined by (ISC)2 for CISSP.

4 What are the four components of a complete organizational security policy and their basic purpose?

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Подняться наверх