____ seeks to determine the risks that an organization faces against its information assets.

A. Risk identification
B. Security policy design
C. Security policy evaluation
D. Compliance monitoring and evaluation


Answer: A

Computer Science & Information Technology

You might also like to view...

Case Based Critical ThinkingKatie wants to be sure that her designers are using InDesign as effectively as possible. Though she doesn't want them to rush through their jobs, she does want them to utilize the software to its fullest effect. A client has supplied a layout for an eight page newsletter with four photos at the bottom of each page. The best way to evenly space the photos on each page would be to use the___.  

A. Transform panel B. Step and Repeat dialog box C. Align buttons in the Align Panel D. Distribute buttons in the Align Panel

Computer Science & Information Technology

In sign-and-magnitude format, what does 01112 represent?

a. 8 b. -7 c. +7 d. 110

Computer Science & Information Technology

UNIX __________ names are generally terse (ed for editor, cp for copy a file), but meaningful.

a. file b. path c. icon d. line command

Computer Science & Information Technology

Personal blogs, which let users post short articles of information and opinion, emerged around the year 1997

Indicate whether the statement is true or false

Computer Science & Information Technology