Fill in the policy below. Submit to see how well you did!
Section | Description | Your Answer |
---|---|---|
Access Control | Include key terms like password policy, MFA, and RBAC. | |
Incident Response | Mention terms like Incident Response Plan, CIRT, risk register. | |
Encryption Standards | Include technologies like AES, RSA, ECC, and Full Disk Encryption. | |
Network Security | Mention defenses like Firewalls, VPNs, SIEM, IDS/IPS. | |
Legal & Compliance | Include terms like NDA, SLA, GDPR, Clean Desk Policy. |