Which of the following is a common element of the enterprise information security policy?

A. access control lists
B. information on the structure of the InfoSec organization
C. articulation of the organization's SDLC methodology
D. indemnification of the organization against liability


Answer: B

Computer Science & Information Technology

You might also like to view...

If a class contains an abstract method __________.

a. you must create an instance of the class b. the method will only have a header, but not a body, and will end with a semicolon c. the method cannot be overridden in subclasses d. All of these are true.

Computer Science & Information Technology

Each narrow range of pitches is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Date and time functions are used to format and work with cell contents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the biggest problem with live acquisitions??

What will be an ideal response?

Computer Science & Information Technology