Which function needed to implement the information security program includes researching, creating, maintaining, and promoting information security plans?
A. compliance
B. policy
C. planning
D. SETA programs
Answer: C
Computer Science & Information Technology
You might also like to view...
Privilege escalation is used in computer programs to bypass normal authentication
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is a monitoring control that safeguard against loss of integrity?
A. File integrity monitoring B. Separation of duties C. Encryption D. Digital signatures
Computer Science & Information Technology