Which of the following is NOT an example of off-slide content reviewed by the Document Inspector?

A) Notes B) Text entered in the footer
C) Comments D) Personal information


B

Computer Science & Information Technology

You might also like to view...

Match each term with the correct statement below.

A. A measurement process that produces discrete objective data B. The specific framework of controls used by an organization C. A response in advance of a potential incident D. The present status of the elements of an operating environment E. A collection of explicit controls designed to accomplish a purpose F. Additional work required to finalize a solution; usually results from a review G. Large-scale process designed to ensure management control H. Formal process used to identify and characterize threats I. A response that takes place after an incident has occurred

Computer Science & Information Technology

The information security __________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

According to the textbook, three aspects must be taken into account to determine risk: the threat, the asset, and the ______.

A. sustainability B. treatability C. vulnerability D. accessibility

Computer Science & Information Technology

When being used as a portable device, the components inside a laptop computer derive their power from the ________ inside the computer

Fill in the blank(s) with correct word

Computer Science & Information Technology