Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction best defines
A) information security.
B) security audit.
C) anti-virus protection.
D) incident management.
A
You might also like to view...
If a company's free cash flow is $66,000, net cash flows from operating activities total $133,000, purchases of plant assets total $61,000, and the payment of dividends was $20,000, what amount was obtained from the sale of plant assets?
A) $7,000 B) $14,000 C) $28,000 D) Impossible to determine from the facts given.
Rebecca’s manager has asked her to attend training on the department’s new process for completing purchase orders and soliciting bid proposals. However, Rebecca likes the current process for doing these tasks and sees no reason to change it. Therefore, she refuses to attend the training. It appears that Kathleen’s ________ to attend training is low.
A. time B. need C. self-efficacy D. willingness E. determination
A ________ refers to a promise in which one person agrees to answer for the debts or duties of another person.
A. covenant B. guaranty contract C. recision D. novation
Char's daughter Delsey dies before Char, leaving Delsey's son Egor. On Char's death, it is learned that Char's will gives "to my daughter Delsey my ranch in Mesquite County, Texas." Most likely, the gift of the ranch
A. abates. B. will not lapse. C. lapses in full. D. lapses in part.