Fill in the policy below. Submit to see how well you did!
| Section | Description | Your Answer |
|---|---|---|
| Access Control | Include key terms like password policy, MFA, and RBAC. | |
| Incident Response | Mention terms like Incident Response Plan, CIRT, risk register. | |
| Encryption Standards | Include technologies like AES, RSA, ECC, and Full Disk Encryption. | |
| Network Security | Mention defenses like Firewalls, VPNs, SIEM, IDS/IPS. | |
| Legal & Compliance | Include terms like NDA, SLA, GDPR, Clean Desk Policy. |