An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

A. plan
B. framework
C. model
D. policy


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the extension for the NIS map data file?

A. .dat B. .mpd C. .pag D. .dir

Computer Science & Information Technology

What did the Jdbgmgr hoax ask users to do?

a. Install the jdbgmgr file on their systems. b. Delete the jdbgmgr file from their systems. c. Warned users not sent their taxes online because it's now safe. d. Warned users that the virus will damage their hardware.

Computer Science & Information Technology

Google or Bing let you use _______ filtering to remove as much offensive or explicit content as possible.

A. SafeSearch B. Preference C. Sponsored D. search engine optimization

Computer Science & Information Technology

You can use ______________________ to automatically create gradual transitions between a property's starting value and its ending value.

A. Property panel B. Layers panel C. Auto-Transition Mode D. Opacity property

Computer Science & Information Technology