SOFTWARE TESTING
TESTING PRINCIPLES AND CONCEPTS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following is an approach to implement information Security policy? (Unit 14)
|
Minimal Use of Data in Web Pages
|
|
Use of videos and animated contents in the website
|
|
Provide information security awareness training to the developers
|
|
Provide access to the websites for unauthorized users
|
Explanation:
Detailed explanation-1: -Encryption. Antivirus And Anti-Malware Software. Firewalls. Security Information And Event Management (SIEM)
Detailed explanation-2: -Technical security policies describe the configuration of the technology for convenient use; body security policies address however all persons should behave.
Detailed explanation-3: -Step 1: Build an Information Security Team. Step 2: Inventory and Manage Assets. Step 3: Assess Risk. Step 4: Manage Risk. Step 5: Develop an Incident Management and Disaster Recovery Plan. Step 6: Inventory and Manage Third Parties. Step 7: Apply Security Controls. More items
There is 1 question to complete.