I'm a little confused by this question. The options don't seem to be directly related to encryption controls. I'll need to review the ISO 27002 standard more closely to make sure I understand the right approach.
Okay, I've got this. The key is to focus on the specific domain of "Encryption" and select the controls that are most directly related to that. Cryptographic Controls Use Policy and Key management seem like the clear choices here.
Hmm, I'm a bit unsure about this one. I know encryption is important, but I'm not sure if the other options are directly related to that domain. Let me think this through a bit more.
I'm a little confused by the wording of the options. I know NFV is designed for telecom providers, but I'm not sure about the 70% efficiency claim. I'll need to re-read the options closely.
Hmm, I'd say B and D as well. Although a good physical security perimeter is always important, can't forget the crypto and keys. Gotta keep those hackers out!
German
3 months agoAhmad
3 months agoKenny
3 months agoGlenn
4 months agoMadalyn
4 months agoRozella
4 months agoCarmelina
4 months agoKenneth
4 months agoGennie
5 months agoThora
5 months agoLorrie
5 months agoGerman
5 months agoSusy
5 months agoLavina
5 months agoCarey
1 year agoSarah
1 year agoLili
1 year agoAnastacia
1 year agoTomas
1 year agoChantay
1 year agoDelisa
1 year agoCarolynn
1 year agoTracey
1 year agoRicki
1 year agoChana
1 year agoSelene
1 year agoTelma
1 year agoTijuana
1 year agoLottie
1 year agoEffie
1 year ago