Which function needed to implement the information security program includes researching, creating, maintaining, and promoting information security plans?

A. compliance
B. policy
C. planning
D. SETA programs


Answer: C

Computer Science & Information Technology

You might also like to view...

The earliest known, and simplest use, of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In most applications, the code to fill a dataset with data belongs in the form's Fill event procedure.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Within the VMM server is the VMM ___________, which connects to the VMM database.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The default name placed in the content control name box by Word is the:

A) name registered as the Microsoft Windows owner's name for your computer. B) username of the current Microsoft Windows user. C) username of the current Microsoft Office user. D) name registered as the Microsoft Office user name for your computer.

Computer Science & Information Technology