The ____ plan should lay out a comprehensive strategy that will guard against the malicious actions of human beings in the workforce.

A. data security
B. personnel security
C. system security
D. resource security


Answer: B

Computer Science & Information Technology

You might also like to view...

The meta description is added to a page using the Description button in the Head button arrow list on the ____ category of the Insert panel.

A. Layout B. Common C. HTML D. Text

Computer Science & Information Technology

To optimize the monthly payments, you would designate the home cost, down payment, APR, and number of years for the loan as the ________ variable cells

A) objective B) independent C) dependent D) changing

Computer Science & Information Technology

###### in a cell means that the ____________.

A. formula contains an error B. value contains an error C. label has a spelling error D. column is too narrow to display the value completely

Computer Science & Information Technology

What is a benefit of a host-based firewall?

A. Prevent the installation of malware. B. Prevent users from accessing unauthorized files stored on network shares. C. Block attacks originating from the local network. D. Stop attacks from the keyboard.

Computer Science & Information Technology