Multiple Choice
Information security is defined in the ____ component of an EISP.
A) Information Technology Security Responsibilities and Roles
B) Information Technology Security Elements
C) Need for Information Technology Security
D) Reference to Other Information Technology Standards and Guidelines
Correct Answer:

Verified
Correct Answer:
Verified
Q31: _ are used to create procedures.<br>A) Guidelines<br>B)
Q32: When more than two audiences are to
Q33: According to Confucius,"Tell me,and I forget; show
Q34: A(n)_ screen is an acknowledgment screen that
Q35: A policy should be "signed into law"
Q37: Access control lists can be used to
Q38: A risk assessment is performed during the
Q39: Policies must also specify the penalties for
Q40: Typically,the information security policy administrator is _.<br>A)
Q41: <u>Practices</u> are built on sound policy and