Multiple Choice
It is recommended that the ____ approach(es) to creating and managing ISSPs be used.
A) individual
B) comprehensive
C) modular
D) individual or modular
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: A(n)_ security policy provides detailed,targeted guidance to
Q2: Technical controls _.<br>A) must be implemented using
Q4: During the<u> implementation </u>phase of the policy
Q5: A disadvantage of creating a modular ISSP
Q7: Once policies are created,they should not be
Q8: Unless a particular use is clearly prohibited,the
Q9: The ISSP should begin with a _.<br>A)
Q10: An effective issue-specific security policy serves to
Q11: In the Flesch Reading Ease scale,the higher
Q33: The champion and manager of the information