All of the behaviors that the creators of the EBK deemed necessary to ensure fundamentally proper security were categorized into ____ competency areas.
A. 10
B. 12
C. 14
D. 16
Answer: C
Computer Science & Information Technology
You might also like to view...
To add a server role from the command-line version, type the command ________________
a. Servermanagercmd –install role b. Serveradd role c. ManageServer add role d. None of the above.
Computer Science & Information Technology
It is good practice for the policy _________________________ to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology