An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.
A. plan
B. framework
C. model
D. policy
Answer: B
You might also like to view...
What is the extension for the NIS map data file?
A. .dat B. .mpd C. .pag D. .dir
What did the Jdbgmgr hoax ask users to do?
a. Install the jdbgmgr file on their systems. b. Delete the jdbgmgr file from their systems. c. Warned users not sent their taxes online because it's now safe. d. Warned users that the virus will damage their hardware.
Google or Bing let you use _______ filtering to remove as much offensive or explicit content as possible.
A. SafeSearch B. Preference C. Sponsored D. search engine optimization
You can use ______________________ to automatically create gradual transitions between a property's starting value and its ending value.
A. Property panel B. Layers panel C. Auto-Transition Mode D. Opacity property