____ and responsibilities are assigned by designating accountability for performance of each security activity.

A. Roles
B. Rules
C. Policies
D. Procedures

Answer: A

Computer Science & Information Technology

You might also like to view...

If an audio file is intended as background music but stops before you get to the last slide, use the ________ feature

A) Loop Until Stopped B) Play Across Slides C) Timing D) With Previous or After Previous

Computer Science & Information Technology

A special facial recognition lock will only recognize

A) The facial features of the family who work on the computer B) The digitized photos of family members C) A computer technician who is hired to work on the computer D) The facial features used to lock the computer screen

Computer Science & Information Technology