_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission.
A. Management B. Technical
C. Preventative D. Supportive
A. Management
You might also like to view...
Which image type is defined by text files?
a. SVC b. JPEG c. PNG d. GIF
Identify the method associated with browser locations that can find the protocol, hostname, and port number of the URL.
A. location.pathname B. location.hash C. location.origin D. location.search
If numAddr is a pointer, ____ means the variable whose address is stored in numAddr.
A. *numAddr B. numAddr* C. &numAddr D. *&numAddr
A server administrator is updating the kernel for servers during the middle of the work day. After defining the steps required to perform this scope of work, which of the following would be the NEXT step needed to complete this task?
A. Perform the system updates B. Determine MTTR C. Request an impact analysis report D. Schedule time to perform updates