_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission.

A. Management B. Technical

C. Preventative D. Supportive


A. Management

Computer Science & Information Technology

You might also like to view...

Which image type is defined by text files?

a. SVC b. JPEG c. PNG d. GIF

Computer Science & Information Technology

Identify the method associated with browser locations that can find the protocol, hostname, and port number of the URL.

A. location.pathname B. location.hash C. location.origin D. location.search

Computer Science & Information Technology

If numAddr is a pointer, ____ means the variable whose address is stored in numAddr.

A. *numAddr B. numAddr* C. &numAddr D. *&numAddr

Computer Science & Information Technology

A server administrator is updating the kernel for servers during the middle of the work day. After defining the steps required to perform this scope of work, which of the following would be the NEXT step needed to complete this task?

A. Perform the system updates B. Determine MTTR C. Request an impact analysis report D. Schedule time to perform updates

Computer Science & Information Technology