Which of the following can be defined as strategies for information security?

Which of the following can be defined as strategies for information security? (Choose all that apply)

Which of the following can be defined as strategies for information security? (Choose all that apply)

A.
Public key infrastructure.

B.
Encrypting file system.

C.
IPSec utilization

D.
Secure email

E.
Website security

F.
Only A, B, C

G.
None of the above

Explanation:
Strategies for information security includes the organization’s public key infrastructure, use of the encrypting file system, authentication for remote access users, IPSec utilization, secure email, website security, and signed software code, if applicable.
Incorrect Answers
F: Secure email and website security forms part of the information security.
G: Strategies for information security includes the organization’s public key infrastructure, use of the encrypting file system, authentication for remote access users, IPSec utilization, secure email, website security, and signed software code, if applicable.
References:
Charles J. Brooks, Server+ Certification Exam Cram 2 (Exam SK0-002), QUE Publishing, Indianapolis, 2006, p. 359



Leave a Reply 0

Your email address will not be published. Required fields are marked *