Multiple Choice
The first step in managing IT security is to develop a _____ based on confidentiality,integrity,and availability.
A) security policy
B) risk policy
C) threat report
D) concealment report
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q67: Maintenance expense stay consistently the same during
Q68: Acceptance means that nothing is done;companies usually
Q69: Mitigation shifts the risk to another asset
Q70: _ is a process that monitors current
Q71: _ measures risk likelihood and impact.<br>A) Risk
Q73: In a typical system,the initial version of
Q74: A test site is an alternate IT
Q75: The main objective of training is to
Q76: Using a release methodology reduces the documentation
Q77: Bandwidth requirements are expressed in bytes per