All of the behaviors that the creators of the EBK deemed necessary to ensure fundamentally proper security were categorized into ____ competency areas.

A. 10
B. 12
C. 14
D. 16

Answer: C

Computer Science & Information Technology

You might also like to view...

To add a server role from the command-line version, type the command ________________

a. Servermanagercmd –install role b. Serveradd role c. ManageServer add role d. None of the above.

Computer Science & Information Technology

It is good practice for the policy _________________________ to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology