Which of the following can be defined as strategies for information security? (Choose all that apply)
A.
Public key infrastructure.
B.
Encrypting file system.
C.
IPSec utilization
D.
Secure email
E.
Website security
F.
Only A, B, C
G.
None of the above
Explanation:
Strategies for information security includes the organization’s public key infrastructure, use of the encrypting file system, authentication for remote access users, IPSec utilization, secure email, website security, and signed software code, if applicable.
Incorrect Answers
F: Secure email and website security forms part of the information security.
G: Strategies for information security includes the organization’s public key infrastructure, use of the encrypting file system, authentication for remote access users, IPSec utilization, secure email, website security, and signed software code, if applicable.
References:
Charles J. Brooks, Server+ Certification Exam Cram 2 (Exam SK0-002), QUE Publishing, Indianapolis, 2006, p. 359