MANAGEMENT

BUISENESS MANAGEMENT

RISK MANAGEMENT

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Chris is advising travelers from his organization who will be visiting many different countries overseas. He is concerned about compliance with export control laws. Which of the follow-ing technologies is most likely to trigger these regulations?
A
Memory chips
B
Office productivity applications
C
Hard drives
D
Encryption software
Explanation: 

Detailed explanation-1: -Defense in depth states that organizations should have overlapping security controls designed to meet the same security objectives whenever possible. This approach provides security in the event of a single control failure.

Detailed explanation-2: -SLAs do not normally address issues of data confidentiality. Those provisions are normally included in a non-disclosure agreement (NDA).

Detailed explanation-3: -Awareness establishes a minimum standard of information security understanding. It is designed to accommodate all personal of the organization staff regardless of their assigned tasks.

Detailed explanation-4: -Confidentiality protects sensitive information from unauthorized disclosure or intelligible interception. Cryptography and access control are used to protect confidentiality.

There is 1 question to complete.