The first step in managing IT security is to develop a _____ based on confidentiality,integrity,and availability.
A) security policy
B) risk policy
C) threat report
D) concealment report
Correct Answer:
Verified
Q61: A _ is a security weakness or
Q62: A _ is an internal or external
Q63: Another of George's clients has software that
Q64: Provide three signs indicating a system has
Q65: Define network.What is required to connect to
Q67: List at least eight different tasks a
Q68: _ develops safeguards that reduce risks and
Q69: _ prevents unauthorized users from creating,modifying,or deleting
Q70: What is capacity planning? Include an explanation
Q71: _ analyzes an organization's assets,threats,and vulnerabilities.
A) Risk
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents