Multiple Choice
Technical controls ____.
A) must be implemented using access control list
B) must be implemented using configuration rules
C) must be implemented using user profiles
D) can be implemented using access control lists or configuration rules
Correct Answer:

Verified
Correct Answer:
Verified
Q1: A(n)_ security policy provides detailed,targeted guidance to
Q4: During the<u> implementation </u>phase of the policy
Q5: A disadvantage of creating a modular ISSP
Q6: It is recommended that the _ approach(es)to
Q7: Once policies are created,they should not be
Q8: Unless a particular use is clearly prohibited,the
Q9: The ISSP should begin with a _.<br>A)
Q10: An effective issue-specific security policy serves to
Q11: In the Flesch Reading Ease scale,the higher
Q33: The champion and manager of the information