Which one of the following is NOT a key component of a thorough personnel security program?

a. Background investigations
b. Fire protection
c. Exit procedures
d. Monitoring


Ans: b. Fire protection

Computer Science & Information Technology

You might also like to view...

Write a function that uses the same process to draw a vertical line down the middle of the picture, and a horizontal line across the middle of the picture, neatly separating the picture into four quadrants. This function can work for any square or rectangular picture.

What will be an ideal response?

Computer Science & Information Technology

The COUNTIF function has two arguments ________

A) the range of cells to sum and the criteria B) a value as the criteria and an average of a range of cells C) the range of cells to check and the sum of the range D) the range of cells to check and the criteria

Computer Science & Information Technology

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network.    What type of documentation did Randy discover?

A. Network topology B. Inventory management C. Knowledge base D. Architectural drawing

Computer Science & Information Technology

The && operator has a higher precedence than the || operator.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology