Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?

A. can suffer from poor policy dissemination, enforcement, and review
B. may skip vulnerabilities otherwise reported
C. may be more expensive than necessary
D. implementation can be less difficult to manage


Answer: A

Computer Science & Information Technology

You might also like to view...

?Assume you are not part of an e-commerce project team at your organization, yet they seek your inputs because you are very knowledgeable in the area of consumer behavior. You are known as the ______ in the project.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which keyboard shortcut undoes the most recent action performed in a document?

A) Ctrl + A B) F4 C) Ctrl + U D) Ctrl + Z

Computer Science & Information Technology

Among the media-related apps, the ____________________ app displays the most recent sports news and scores.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

. During the ____________________ design or approach to the case, you outline the general steps you need to follow to investigate the case.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology