____ must be standard, because they should be used for causal analysis and comparative purposes across the organization.

A. Security metrics
B. Security controls
C. Security objectives
D. Security records


Answer: A

Computer Science & Information Technology

You might also like to view...

Which NTFS feature allows an administrator to restrict the amount of disk space used by a user?

A. EFS B. Disk Quotas C. Symbolic links D. Permissions

Computer Science & Information Technology

The ____________________ feature is the electronic equivalent of using paper sticky notes as reminders.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To draw a line between columns, click Columns and then More Columns.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Only limited application types can be run in a virtual machine. More complex systems like databases and email services cannot be virtualized.

Answer the following statement(s) true (T) or false (F)

Computer Science & Information Technology