Proper security administration policies, controls, and procedures enforce which of the following?

A. The total reduction of malware
B. The elimination of risk
C. Separation of duties
D. The AIC objectives


Answer: D. The AIC objectives

Computer Science & Information Technology

You might also like to view...

The Intel 64-bit __________ architecture is a radical departure from the Intel 32-bit Pentium architecture.

a. Itanium b. Celeron c. MMX d. Intel does not offer a 64-bit architecture.

Computer Science & Information Technology

Each separate array variable is one ____ of an array.

A. element B. block C. factor D. aspect

Computer Science & Information Technology

Which title would probably not be used by a technician?

A) Mr. B) Ms. C) Professor D) Secretary

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which type of test is used to verify that all programs in an application work together properly?

A. unit B. systems C. acceptance D. integration

Computer Science & Information Technology