Organizations must consider all but which of the following during development and implementation of an InfoSec measurement program?

A. Measurements must yield quantifiable information.
B. Data that supports the measures needs to be readily obtainable.
C. Only repeatable InfoSec processes should be considered for measurement.
D. Measurements must be useful for tracking non-compliance by internal personnel.


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is not part of the function signature?

a. function name b. constant member function declaration c. parameter passing mechanisms d. return type e. all of the above are part of the signature

Computer Science & Information Technology

The Eraser Tool options bar displays a ____ box in which you can specify how quickly the erasure is performed.

a. Flow b. Rate c. Speed d. Transformation

Computer Science & Information Technology

Write a program that uses a loop (or loops) to find the address where the Riddler plans to strike.

Holy digits Batman! The Riddler is planning his next caper somewhere on Pennsylvania Avenue. In his usual sporting fashion, he has left the address in the form of a puzzle. The address on Pennsylvania is a four digit number where: • All four digits are different • The digit in the thousands place is three times the digit in the tens place • The number is odd • The sum of the digits is 27 Loop over all the digits in the address. You can generate an integer that corresponds to the digits and check if it meets the constraints, or check if individual digits meet the constraints.

Computer Science & Information Technology

The ____ attribute of a form specifies the way form data will be sent to the location specified in the Action box.

A. Form ID B. Method C. Target D. Enctype

Computer Science & Information Technology