Which of the following requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans?

A) Center for Information Technology
B) Computer Crimes Act of Oklahoma
C) Sarbanes-Oxley (SOX)
D) Computer Security Act of 1987

D) Computer Security Act of 1987

Computer Science & Information Technology

You might also like to view...

Which of the following mouse buttons is pressed if thevalue of theevt.buttonsproperty is 2?

A. the left mouse button B. the right mouse button C. the middle mouse button D. the back mouse button

Computer Science & Information Technology

To contact people using the Internet, you most often use their ____.

A. domain names B. e-mail addresses C. usernames D. passwords

Computer Science & Information Technology