Multiple Choice
Typically,the information security policy administrator is ____.
A) the CEO
B) the COO
C) a mid-level staff member
D) the CIO
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q35: A policy should be "signed into law"
Q36: Information security is defined in the _
Q37: Access control lists can be used to
Q38: A risk assessment is performed during the
Q39: Policies must also specify the penalties for
Q41: <u>Practices</u> are built on sound policy and
Q42: In the bull's-eye model,issues are addressed
Q43: List and briefly describe the major components
Q44: To be effective,policy must be uniformly applied
Q45: Practices are created from _.<br>A) profiles<br>B) procedures<br>C)