Question 19

Which of the following federal laws is designed to protect computer data from theft

Correct Answer:B

Question 20

Fill in the blanks with an appropriate phrase. The is the process of translating system requirements into detailed function criteri a.

Correct Answer:A

Question 21

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

Question 22

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS

Correct Answer:A

Question 23

TQM recognizes that quality of all the processes within an organization contribute to the quality of the product. Which of the following are the most important activities in the Total Quality Management Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 24

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

Correct Answer:A

START ISSEP EXAM