The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.

A. security policy
B. risk policy
C. threat report
D. concealment report


Answer: A

Computer Science & Information Technology

You might also like to view...

A general path is ________.

a. a set of polylines that do not result in a closed shape b. a shape constructed from straight lines and complex curves c. the shape of the curve in a font’s characters d. represented by an object of class GraphicsPath

Computer Science & Information Technology

Why are the elements in the STL set (and map) kept sorted?

What will be an ideal response?

Computer Science & Information Technology

According to  Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the path to the ‘Remove All Arrows' arrow?

A. (FORMULAS tab | Reviewing group) B. (FORMULAS tab | Formula Auditing group) C. (FORMULAS tab | Arrows group) D. None of the above

Computer Science & Information Technology