The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.
A. security policy
B. risk policy
C. threat report
D. concealment report
Answer: A
You might also like to view...
A general path is ________.
a. a set of polylines that do not result in a closed shape b. a shape constructed from straight lines and complex curves c. the shape of the curve in a font’s characters d. represented by an object of class GraphicsPath
Why are the elements in the STL set (and map) kept sorted?
What will be an ideal response?
According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job.
Answer the following statement true (T) or false (F)
Which of the following is the path to the ‘Remove All Arrows' arrow?
A. (FORMULAS tab | Reviewing group) B. (FORMULAS tab | Formula Auditing group) C. (FORMULAS tab | Arrows group) D. None of the above