____ and responsibilities are assigned by designating accountability for performance of each security activity.
A. Roles
B. Rules
C. Policies
D. Procedures
Answer: A
Computer Science & Information Technology
You might also like to view...
If an audio file is intended as background music but stops before you get to the last slide, use the ________ feature
A) Loop Until Stopped B) Play Across Slides C) Timing D) With Previous or After Previous
Computer Science & Information Technology
A special facial recognition lock will only recognize
A) The facial features of the family who work on the computer B) The digitized photos of family members C) A computer technician who is hired to work on the computer D) The facial features used to lock the computer screen
Computer Science & Information Technology