What is the first phase of the development of a security policy likely to involve?

A. remediation of employees that violate the policy
B. review of the policy for compliance
C. vulnerability assessment
D. an outline of how the organization will respond to attacks


Answer: C

Computer Science & Information Technology

You might also like to view...

When you evaluate a camera's picture quality, the resolution is expressed in ________

A) gigapixels B) megapixels C) micropixels D) macropixels

Computer Science & Information Technology

In the OpenOffice Calc application, each cell is referred to by its unique cell ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The DECnet protocols are based on a network architecture that is referred to as the ____.

A. Digital Network Architecture B. Digital Network Infrastructure C. Digital Network Alliance D. Digital Network Alignment

Computer Science & Information Technology

A query is a request for information from a data source.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology