An enterprise information security policy (EISP) is also known as a(n) ____.

A. issue-specific security policy
B. general security policy
C. systems-specific security policy
D. strategic planning policy


Answer: B

Computer Science & Information Technology

You might also like to view...

In the following statement, which operator is used first?

while (x++ < 10) a. ++ b. < c. neither; the expression is invalid d. cannot tell without the rest of the code

Computer Science & Information Technology

To deselect text, you should click away from the text that is currently selected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A proxy server acts as an agent between a web browser and a real server

Indicate whether the statement is true or false

Computer Science & Information Technology

FAT32 volumes do not support NTFS __. Changes can be made for a specific user by clicking a user name and then the Edit button.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology