The proper development of a security policy is accomplished through what is called the ____.
A. software life cycle
B. data life cycle
C. assets policy cycle
D. security policy cycle
Answer: D
You might also like to view...
What file systems supported by Windows can be used for volumes and drives that don't hold the Windows installation? (Choose all that apply.)
A. FAT64 B. FAT32 C. exFAT D. NTFS
In an outline, each topic is either identified as body text or is assigned a(n) ________ level
Fill in the blank(s) with correct word
How does a computer determine who can or should access it, and once accessed, what that user can do?
A. Decryption B. Authentication C. Encryption D. Transparency
You add keywords to a page with the Keywords button in the Head button arrow list in the ____ category of the Insert panel.
A. Common B. Layout C. Templates D. HTML