The __________ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate; it enables all other information security components to function correctly.
A. Policies
B. Networks
C. Systems
D. Applications
Answer: A
Computer Science & Information Technology
You might also like to view...
A user can modify a cell style
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ meta tag configures scale and dimension on mobile web page display
a. flexible b. viewport c. fragment identifier d. media query
Computer Science & Information Technology