List three of the eight general capabilities required for IT security professional by the EBK.

What will be an ideal response?

Manage, design, and evaluate data security
Evaluate enterprise continuity programs
Design and evaluate incident management programs
Design, implement, and evaluate IT security training and awareness programs
Design and evaluate personnel security programs
Design and evaluate physical and environmental security programs
Implement regulatory and standards compliance
Design, implement, and evaluate risk management programs

Computer Science & Information Technology

You might also like to view...

You can choose to sign up for Pinterest with your existing Facebook or LinkedIn account, or with just your email address

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following statements is true?

a. Each object (instance) of the class shares the class’s instance variables. b. Most instance-variable declarations are preceded with the keyword public, which is an access modifier. c. Variables or methods declared with access modifier private are accessible only to methods of the class in which they’re declared. d. None of the above is true.

Computer Science & Information Technology