An IT security plan should include details of _________.
A. risks B. recommended controls
C. responsible personnel D. all of the above
D. all of the above
You might also like to view...
Why is JavaFX preferred?
a. JavaFX is much simpler to learn and use for new Java programmers. b. JavaFX provides a multi-touch support for touch-enabled devices such as tablets and smart phones. c. JavaFX has a built-in 3D, animation support, video and audio playback, and runs as a standalone application or from a browser. d. JavaFX incorporates modern GUI technologies to enable you to develop rich Internet applications.
Which command is used to resave frequently used text and then insert the saved text as needed in other documents?
A. Bookmark B. Template C. Text box D. Quick Parts
Which of the following is an example of an instruction written in assembly language?
A. sum = num1 + num2 B. 0000 0101 1100 0000 C. MUL bx, ax D. repeat 5 times
The chief Risk officer is concerned about the new employee BYOD device policy and has requested the security department implement mobile security controls to protect corporate data in the event that a device is lost or stolen. The level of protection must not be compromised even if the communication SIM is removed from the device. Which of the following BEST meets the requirements?
A. Asset tracking B. Screen-locks C. GEO-Tracking D. Device encryption