An enterprise information security policy (EISP) is also known as a(n) ____.
A. issue-specific security policy
B. general security policy
C. systems-specific security policy
D. strategic planning policy
Answer: B
Computer Science & Information Technology
You might also like to view...
In the following statement, which operator is used first?
while (x++ < 10) a. ++ b. < c. neither; the expression is invalid d. cannot tell without the rest of the code
Computer Science & Information Technology
To deselect text, you should click away from the text that is currently selected.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A proxy server acts as an agent between a web browser and a real server
Indicate whether the statement is true or false
Computer Science & Information Technology
FAT32 volumes do not support NTFS __. Changes can be made for a specific user by clicking a user name and then the Edit button.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology