Which of the following documents contains the threats to the information management, and the
security services and controls required to counter those threats?
You have been tasked with finding an encryption methodology that will encrypt most types of email
attachments. The requirements are that your solution must use the RSA algorithm. Which of the
following is your best choice?
Which of the following are the most important tasks of the Information Management Plan (IMP)?
Each correct answer represents a complete solution. Choose all that apply.