18.When you are attempting to install a new security mechanism for which there is not a detailed step-by-step guide on how to implement that specific product, which element of the security policy should you turn to?
A.Policies
B.Procedures
C.Standards
D.Guidelines
19.While performing a risk analysis, you identify a threat of fire and a vulnerability because there
are no fire extinguishers. Based on this information, which of the following is a possible risk?
A.Virus infection
B.Damage to equipment
C.System malfunction
D.Unauthorized access to confidential information
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here