Which of the following functions of information security management seeks to dictate certain behavior within the organization through a set of organizational guidelines?

A. planning
B. policy
C. programs
D. people


Answer: B

Computer Science & Information Technology

You might also like to view...

When using a(n) ________, Access prompts the user for input when the report is opened and then filters the report based on what the user keyed in

Fill in the blank(s) with correct word

Computer Science & Information Technology

A watermark is a graphic displaying in the background of a worksheet

Indicate whether the statement is true or false.

Computer Science & Information Technology

MBR has a drive limit of 2.1TB. To partition a hard drive of more than 2.1TB as a single, bootable partition, which of the following is needed? (Choose all that apply.)

a. UEFI firmware b. 64-bit operating system c. Custom boot manager d. Windows Vista or newer

Computer Science & Information Technology

____________________ is a method of organization in which information is not presented linearly, but in whatever order is requested by the user.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology