One of the most widely referenced InfoSec management models, known as Information Technology-Code of Practice for Information Security Management, is also known as __________.

A. ISO 27002
B. IEC 27100
C. NIST SP 800-12
D. IEEE 801


Answer: A

Computer Science & Information Technology

You might also like to view...

A class can contain ________.

a) methods b) instance variables c) enumerations d) constants e) All of the above.

Computer Science & Information Technology

When processing the Insert method, the computer makes a temporary copy of the string in memory, and then inserts the characters in the copy only.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What specific tool will display real time graphs, hard disk drive usage, CPU usage, network usage, and memory usage?

A) System Stability Index B) Resource Overview C) Computer Management D) Disk Management

Computer Science & Information Technology

It is much less expensive to alter webpages that are completed than it is to make corrections to a website in the early phases of project development.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology