Effective planning for information security involves:
A. collecting information about an organization's objectives.
B. collecting information about an organization's information security environment.
C. collecting information about an organization's technical architecture.
D. All of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
What type of JOIN returns all rows from both tables?
a. FULL OUTER JOIN b. LEFT OUTER JOIN c. RIGHT OUTER JOIN d. INNER JOIN
Computer Science & Information Technology
What will be deleted from a table by a DELETE FROM statement if the WHERE clause is not provided?
a) The first field/column in the table b) The most recently-added data c) Everything d) Nothing – the WHERE clause is required. e) None of these is correct.
Computer Science & Information Technology