Which of the following is NOT a part of an information security program?
A. technologies used by an organization to manage the risks to its information assets
B. activities used by an organization to manage the risks to its information assets
C. personnel used by an organization to manage the risks to its information assets
D. All of these are part of an information security program.
Answer: D
You might also like to view...
High-level languages are used to develop applications, games, Web apps, and most other software.
Answer the following statement true (T) or false (F)
VMM should always be your first choice when selecting a tool to monitor a cluster.
Answer the following statement true (T) or false (F)
What objects in ActionScript are classes?
What will be an ideal response?
Google purchased Android in 2011.
Answer the following statement true (T) or false (F)