EISA ensures that the security architecture and controls are in alignment with the organization's core goals and strategic direction.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

Three higher-layer protocols defined as part of TLS are: The Handshake Protocol, The Change Cipher Spec Protocol, and the __________ . ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Solid-state storage cards require a device called a card ____ to transfer data to or from a computer.

A. drive B. reader C. folder D. slot

Computer Science & Information Technology

A ____ occurs when a user clicks a button on a Web page.

A. update B. refresh C. postback D. close

Computer Science & Information Technology

EXX Case 4-1Ms. Irvin is the coach of the varsity swim team.  Each week she has her swimmers turn in a training log which includes distance, stroke tracking, and lap times. She organizes and analyzes these the same way each time by using macros. To display the Microsoft Visual Basic for Applications window, Coach Irvin would right-click a command button, then click ____ from the shortcut menu.

A. View Code B. Design Mode C. ActiveX Control D. Open Window

Computer Science & Information Technology