The __________ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate; it enables all other information security components to function correctly.

A. Policies
B. Networks
C. Systems
D. Applications

Answer: A

Computer Science & Information Technology

You might also like to view...

A user can modify a cell style

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ meta tag configures scale and dimension on mobile web page display

a. flexible b. viewport c. fragment identifier d. media query

Computer Science & Information Technology