Every personnel security strategy has to specify the ____ that will be used to ensure the disciplined behavior of all participants in the process.

A. process and standards
B. process and procedures
C. policies and procedures
D. standards and references


Answer: B

Computer Science & Information Technology

You might also like to view...

PDF was created by _____.

A. Microsoft B. Google C. Apple D. Adobe Systems

Computer Science & Information Technology

A(n) ________ section break separates a single-column format from a two-column format in a document

Fill in the blank(s) with correct word

Computer Science & Information Technology

Is ping a connectionless or a connection-oriented program, and which layer and protocol does it use?

What will be an ideal response?

Computer Science & Information Technology

Another name for an array variable is an element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology