Every personnel security strategy has to specify the ____ that will be used to ensure the disciplined behavior of all participants in the process.
A. process and standards
B. process and procedures
C. policies and procedures
D. standards and references
Answer: B
Computer Science & Information Technology
You might also like to view...
A stateful packet inspection firewalls keeps track of network connections by using which of the following?
a. A state table b. Fuzzy logic c. Least-privileges principle d. Autonomous packet flow
Computer Science & Information Technology
While…End While statement allows the programmer to specify that an action should repeat while:
a) a specific condition remains False b) a specific condition remains True c) a specific condition remains either True or False d) None of the above.
Computer Science & Information Technology