Which of the following is NOT a part of an information security program?

A. technologies used by an organization to manage the risks to its information assets
B. activities used by an organization to manage the risks to its information assets
C. personnel used by an organization to manage the risks to its information assets
D. All of these are part of an information security program.


Answer: D

Computer Science & Information Technology

You might also like to view...

High-level languages are used to develop applications, games, Web apps, and most other software.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

VMM should always be your first choice when selecting a tool to monitor a cluster.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What objects in ActionScript are classes?

What will be an ideal response?

Computer Science & Information Technology

Google purchased Android in 2011.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology