Check all that apply.
Check all that apply.
Check all that apply.
Check all that apply.
Services such as Active Directory are used to set, authorize, or restrict employee access.
Typical techniques include network segmentation and access control lists (ACL) to delineate access rights.
This include workstations, laptops, servers, networking devices, office equipment, etc.
This includes PCI, FINRA, HIPAA, GDPR, state banking department, etc.
This includes PCI, FINRA, HIPAA, GDPR, state banking department, etc.
A WISP outlines employee requirements or best practices regarding sensitive data.
This includes the Organization identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment and making judgments on the Organization's tolerability.
This included categorizing threats and vulnerabilities with the potential to cause a security breach and giving a severity and priority based on the likelihood of occurrence?
Check all that apply.
This data includes Personally Identifiable Information (PII) stored on servers locally or in cloud storage.
This includes data transmitted within a private network, or externally to vendors and customers.
This process includes electronic waste, archived materials, and printed materials.
Phishing is the act of sending a seemingly official email to maliciously harvest credentials.
Penetration tests are used to exploit or discover network weaknesses, and phishing campaigns are used to test user behavior.
These thresholds are based on network activity baselines. The Organization complies with the time frame to report an incident (successful or unsuccessful) to the appropriate authorities (internal or external).