Effective planning for information security involves:

A. collecting information about an organization's objectives.
B. collecting information about an organization's information security environment.
C. collecting information about an organization's technical architecture.
D. All of the above

Answer: D

Computer Science & Information Technology

You might also like to view...

What type of JOIN returns all rows from both tables?

a. FULL OUTER JOIN b. LEFT OUTER JOIN c. RIGHT OUTER JOIN d. INNER JOIN

Computer Science & Information Technology

What will be deleted from a table by a DELETE FROM statement if the WHERE clause is not provided?

a) The first field/column in the table b) The most recently-added data c) Everything d) Nothing – the WHERE clause is required. e) None of these is correct.

Computer Science & Information Technology