- (Exam Topic 2)
Which of the following data security policies is most likely to be the result of a data privacy law?
Correct Answer:A
- (Exam Topic 2)
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations such as copyright or privacy laws?
Correct Answer:D
- (Exam Topic 2)
Which of the following authentication controls combines what a user knows with the unique characteristics of the user respectively?
Correct Answer:B
- (Exam Topic 2)
Which of the following financial instruments should be recorded at fair market value on the financial statements?
Correct Answer:D
- (Exam Topic 2)
Which of the following statements is true with regard to information protection?
Correct Answer:A
- (Exam Topic 2)
During which phase of the contacting process ate contracts drafted for a proposed business activity?
Correct Answer:A