Which function needed to implement the information security program includes researching, creating, maintaining, and promoting information security plans?

A. compliance
B. policy
C. planning
D. SETA programs

Answer: C

Computer Science & Information Technology

You might also like to view...

Privilege escalation is used in computer programs to bypass normal authentication

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is a monitoring control that safeguard against loss of integrity?

A. File integrity monitoring B. Separation of duties C. Encryption D. Digital signatures

Computer Science & Information Technology