Which of the following requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans?
A) Center for Information Technology
B) Computer Crimes Act of Oklahoma
C) Sarbanes-Oxley (SOX)
D) Computer Security Act of 1987
D) Computer Security Act of 1987
Computer Science & Information Technology
You might also like to view...
Which of the following mouse buttons is pressed if thevalue of theevt.buttonsproperty is 2?
A. the left mouse button B. the right mouse button C. the middle mouse button D. the back mouse button
Computer Science & Information Technology
To contact people using the Internet, you most often use their ____.
A. domain names B. e-mail addresses C. usernames D. passwords
Computer Science & Information Technology