The aim of a high-level model like the EBK is to provide a strategic ____ that specifies all of the commonly accepted activities and inter-relationships associated with good security.

A. toolkit
B. plan
C. roadmap
D. framework

Answer: D

Computer Science & Information Technology

You might also like to view...

Clicking on a row heading ________

A) deletes the row B) insert a row above the clicked row C) selects the entire row D) bolds the content of the entire row

Computer Science & Information Technology

Suppose the dictionary is randomly ordered. Asymptotically (that is, in terms of a likely Big-Oh running time), which of the following alterna tives is the fastest if we assume that no words are longer than ten char acters?

a. Sort the dictionary, and then use the algorithm in the text b. Sort the dictionary, but then use interpolation search c. Place the dictionary items in a binary search tree based map; the prefix test must be performed explicitly d. Place the dictionary items in a hash table based map; the prefix test must be performed explicitly e. Use a sequential search of the dictionary

Computer Science & Information Technology