Multiple Choice
Which of the following is not a step in information security management?
A) Define the controls that the threats can impose.
B) Establish an information security policy.
C) Implement controls that address the risks.
D) Identify the threats that can attack the firm's information resources.
Correct Answer:

Verified
Correct Answer:
Verified
Q51: Who is the CIAO and to whom
Q52: A control is a mechanism that is
Q53: Identification and authentication make use of _.
Q54: Identification and authentication make use of_ ,
Q55: When the database and software library are
Q57: The backup plan where hardware, software, and
Q58: Which type of control is built into
Q59: Cryptography is the use of coding by
Q60: Identify the four steps of information security
Q61: What are the 10 security- related practices