Proper security administration policies, controls, and procedures enforce which of the following?
A. The total reduction of malware
B. The elimination of risk
C. Separation of duties
D. The AIC objectives
Answer: D. The AIC objectives
Computer Science & Information Technology
You might also like to view...
The Intel 64-bit __________ architecture is a radical departure from the Intel 32-bit Pentium architecture.
a. Itanium b. Celeron c. MMX d. Intel does not offer a 64-bit architecture.
Computer Science & Information Technology
Each separate array variable is one ____ of an array.
A. element B. block C. factor D. aspect
Computer Science & Information Technology
Which title would probably not be used by a technician?
A) Mr. B) Ms. C) Professor D) Secretary
Computer Science & Information Technology
COGNITIVE ASSESSMENT Which type of test is used to verify that all programs in an application work together properly?
A. unit B. systems C. acceptance D. integration
Computer Science & Information Technology