Every personnel security strategy has to specify the ____ that will be used to ensure the disciplined behavior of all participants in the process.

A. process and standards
B. process and procedures
C. policies and procedures
D. standards and references

Answer: B

Computer Science & Information Technology

You might also like to view...

A stateful packet inspection firewalls keeps track of network connections by using which of the following?

a. A state table b. Fuzzy logic c. Least-privileges principle d. Autonomous packet flow

Computer Science & Information Technology

While…End While statement allows the programmer to specify that an action should repeat while:

a) a specific condition remains False b) a specific condition remains True c) a specific condition remains either True or False d) None of the above.

Computer Science & Information Technology