Which of the following functions of information security management seeks to dictate certain behavior within the organization through a set of organizational guidelines?
A. planning
B. policy
C. programs
D. people
Answer: B
You might also like to view...
When using a(n) ________, Access prompts the user for input when the report is opened and then filters the report based on what the user keyed in
Fill in the blank(s) with correct word
A watermark is a graphic displaying in the background of a worksheet
Indicate whether the statement is true or false.
MBR has a drive limit of 2.1TB. To partition a hard drive of more than 2.1TB as a single, bootable partition, which of the following is needed? (Choose all that apply.)
a. UEFI firmware b. 64-bit operating system c. Custom boot manager d. Windows Vista or newer
____________________ is a method of organization in which information is not presented linearly, but in whatever order is requested by the user.
Fill in the blank(s) with the appropriate word(s).