The SCO specifies the specific ____ elements of the enterprise's information security compliance program.

A. compliance
B. operational
C. accounting
D. control


Answer: D

Computer Science & Information Technology

You might also like to view...

According to the principle of ____, data fields should usually be private, and a client application should be able to access them only through the public interfaces, that is, through the class's public methods.

A. function hiding B. data hiding C. data encapsulation D. data definition

Computer Science & Information Technology

Clicking the Report Selector button:

A) selects the entire report. B) displays a shortcut menu. C) hides the report's underlying data. D) toggles the display of the property sheet.

Computer Science & Information Technology

You can format footers to display differently on even pages and:

a. subordinate pages b. odd pages c. uneven pages

Computer Science & Information Technology

You have a hardcopy of a report that you found some errors on that must be corrected. The report is three pages long and you have about 20 minutes before a meeting you must attend to present the report. Unfortunately, the report was created on your laptop at home and you have no way of getting to it quickly. What is your best option?

A. retype the report on your work computer B. scan the report and use OCR; fix the errors and re-print the report C. use white out and a typewriter to fix the errors D. cross out the errors with a pen and hand write the corrections

Computer Science & Information Technology