The textbook identifies a number of issues that should be considered when developing a security policy.One of the issues is "identify threats".Which of the following is not an example of this issue?
A) What assets need to be protected
B) What are the sources of potential security problems
C) External threats are viruses,worms,retaliations from former employees
D) Internal threats are misuse of assets by employees and embezzlement
Correct Answer:
Verified
Q81: When we say that an organization has
Q82: An effective control for maintaining the privacy
Q82: A business continuity plan (BCP)includes which of
Q83: Enterprise controls:
A)Are controls in Enterprise Resource Planning
Q88: If _ controls are ineffective, this can
Q89: A virtual private network (VPN):
A)Is a security
Q90: Within database systems, a control that restricts
Q90: Which of the following best describes ISO
Q92: A "flying-start site" for disaster recovery purposes
Q94: A company's disaster recovery site that includes
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents