Skip to main content

Section 1.8 Review Questions

  1. In terms of information security, what does CIA stand for? What do each of the principles mean?
  2. Why is it important to have a security plan? What types of controls can a security plan make use of? Give an example of each.
  3. How do backups and encryped data compliment each other? Explain.
You have attempted 1 of 1 activities on this page.