_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission.

A. Management B. Technical
C. Preventative D. Supportive


A. Management

Computer Science & Information Technology

You might also like to view...

Write a PL/SQL block to find the square, cube, and double of a number inputted with a substitution variable, and print results using built-in package DBMS_OUTPUT.

What will be an ideal response?

Computer Science & Information Technology

The present_value argument of the Pmt Function is the amount owed after the final payment has been made

Indicate whether the statement is true or false

Computer Science & Information Technology

Object-oriented programmers also use the term ____ when describing inheritance.

A. has-a B. from-a C. is-a D. contains

Computer Science & Information Technology

Which is the least expensive and most popular 10 GbE media type?

A. 10GBaseSR B. 10GBaseLW C. 10GBaseSW D. 10GBaseLR

Computer Science & Information Technology