A document that defines how an organization deals with some aspect of security is a(n) __________

a. Security policy
b. Business plan
c. Security update
d. None of the above


Answer A. There can be policies regarding end-user behavior, IT response to incidents, or policies for specific issues and incidents.

Computer Science & Information Technology

You might also like to view...

The item at a specific position i within an array can be accessed using the following format: ____.

A. i[].anArray() B. anArray.i() C. i.anArray[] D. anArray[i]

Computer Science & Information Technology

Which of the following statements about a do…while repetition statement is true?

a. The body of a do…while loop is executed only if the terminating condition is true. b. The body of a do…while loop is executed only once. c. The body of a do…while loop is always executed at least once. d. None of the above.

Computer Science & Information Technology

__________ is not an example of a technique for adding parallelism into a SISD computer?

a) Pipelining b) Superscalar execution c) VLIW execution d) none of the above

Computer Science & Information Technology

Moving a worksheet does not affect 3-D references in the workbook.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology