BUISENESS MANAGEMENT
RISK MANAGEMENT
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
GLBA
|
|
SOX
|
|
HIPAA
|
|
FERPA
|
Detailed explanation-1: -Defense in depth states that organizations should have overlapping security controls designed to meet the same security objectives whenever possible. This approach provides security in the event of a single control failure.
Detailed explanation-2: -Which one of the following laws requires that communications service providers cooperate with law enforcement requests? CALEA. The Communications Assistance to Law Enforcement Act (CALEA) requires that all communications carriers make wiretaps possible for law enforcement officials who have an appropriate court order.
Detailed explanation-3: -Which one of the following elements of information is not considered personally identifiable information that would trigger most U.S. state data breach laws? Student identification number.
Detailed explanation-4: -Which of the following security programs is designed to provide employees with the knowledge they need to perform their specific work tasks. Security Training, is designed to provide employees with the specific knowledge they need to fulfill their job functions.