The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.?
A. ?security policy
B. ?risk policy
C. ?threat report
D. ?concealment report
Answer: A
You might also like to view...
________ time is the time it takes the hard drive to locate the first piece of data to send back to the computer
Fill in the blank(s) with correct word
Technically speaking, the process for creating a password digital representation is based on a hash algorithm, which creates a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Many Facebook games are social games, in that players from across the Facebook site interact in ________ gameplay
A) social-time B) equal-time C) live D) real-time
Some software engineering activities overlap with the systems analysis and design activities.
Answer the following statement true (T) or false (F)