The personnel security competency has the required functional perspective of ____.

A. manage, design
B. manage
C. manage, design, evaluate
D. manage, evaluate


Answer: B

Computer Science & Information Technology

You might also like to view...

Get some green posterboard and take a picture of a friend in front of it. Now use chromakey to put her or him in the jungle. Or better yet, in Paris.

An inclusion of the image is all that’s required for this question

Computer Science & Information Technology

The only disadvantage of drawing a table is that you need to be precise when drawing the lines

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the following security roles on the left with the job descriptions on the right

1. data owner a. implements the information classification and controls after they are determined 2. data custodian b. monitors user activities to ensure that the appropriate controls are in place 3. security analyst c. determines the classification level of the information for which he is responsible 4. auditor d. assesses the security needs of the organization

Computer Science & Information Technology

With subscription software, you pay a fee to use the software for a certain time period.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology