Which of the following is NOT a part of an information security program?

A. technologies used by an organization to manage the risks to its information assets
B. activities used by an organization to manage the risks to its information assets
C. personnel used by an organization to manage the risks to its information assets
D. All of these are part of an information security program.

Answer: D

Computer Science & Information Technology

You might also like to view...

The expression 4 + 20 / (3 - 1) * 2 is evaluated to

a. 4 b. 20 c. 24 d. 9 e. 25

Computer Science & Information Technology

Showthat the schedule shown in Figure 21.13 for incorrect execution at SNAP- SHOT isolation can also occur when executing at OPTIMISTIC READ COMMITTED (Section 21.2.1) and will also be incorrect.

What will be an ideal response?

Computer Science & Information Technology