The aim of a high-level model like the EBK is to provide a strategic ____ that specifies all of the commonly accepted activities and inter-relationships associated with good security.

A. toolkit
B. plan
C. roadmap
D. framework


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) An iterator acts like a pointer to an element. 2) STL algorithms can operate on C-like pointer-based arrays. 3) STL algorithms are encapsulated as member functions within each container class. 4) When using the remove algorithm on a vector, the algorithm does not decrease the size of the vector from which elements are being removed. 5) Container member function end yields the position of the container’s last element.

Computer Science & Information Technology

To begin creating sparklines on a worksheet, click the ________ tab

A) Design B) Insert C) Format D) Chart Tools Design

Computer Science & Information Technology

Match the first part of each sentence with the following part:

I. Date of birth is an example II. A table is a collection III. Each record of a table is made up IV. A collection of records is an example V. Interest amount is often an example A. of a calculated field. B. of a constant. C. of records. D. of a table. E. of fields.

Computer Science & Information Technology

?To enhance and assess audience understanding, make your slides interactive by using Office Mix to __________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology